Picture for Richard Zak

Richard Zak

Is Function Similarity Over-Engineered? Building a Benchmark

Add code
Oct 30, 2024
Viaarxiv icon

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection

Add code
Dec 17, 2020
Figure 1 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 2 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 3 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 4 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Viaarxiv icon

Automatic Yara Rule Generation Using Biclustering

Add code
Sep 06, 2020
Figure 1 for Automatic Yara Rule Generation Using Biclustering
Figure 2 for Automatic Yara Rule Generation Using Biclustering
Figure 3 for Automatic Yara Rule Generation Using Biclustering
Figure 4 for Automatic Yara Rule Generation Using Biclustering
Viaarxiv icon

KiloGrams: Very Large N-Grams for Malware Classification

Add code
Aug 01, 2019
Figure 1 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 2 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 3 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 4 for KiloGrams: Very Large N-Grams for Malware Classification
Viaarxiv icon

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Add code
May 16, 2019
Figure 1 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 2 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 3 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 4 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Viaarxiv icon

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

Add code
Jun 12, 2018
Figure 1 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 2 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 3 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 4 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Viaarxiv icon