- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0013000000000000
- More
- Availability
-
22
- Author / Contributor
- Filter by Author / Creator
-
-
Grishchenko, Ilya (4)
-
Kruegel, Christopher (4)
-
Vigna, Giovanni (4)
-
Ruaro, Nicola (2)
-
Aghakhani, Hojjat (1)
-
Beeler, Reuben (1)
-
Cai, Kunlin (1)
-
De_Silva, Ravindu (1)
-
Dresel, Lukas (1)
-
Garcia, Allan (1)
-
Gritti, Fabio (1)
-
Guo, Wenbo (1)
-
McLaughlin, Robert (1)
-
Meng, Dongyu (1)
-
Ortolani, Stefano (1)
-
Su, Zihao (1)
-
Tian, Yuan (1)
-
Vasan, Saastha (1)
-
Vasilenko, Roman (1)
-
#Tyler Phillips, Kenneth E. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available January 10, 2026
-
Vasan, Saastha; Aghakhani, Hojjat; Ortolani, Stefano; Vasilenko, Roman; Grishchenko, Ilya; Kruegel, Christopher; Vigna, Giovanni (, IEEE)Malware detection and classification has been the focus of extensive research over many years. However, less effort has been devoted to developing post-detection systems that identify specific malicious capabilities (or behaviors) in malware. Such systems play a critical part in identifying and mitigating the damage caused by malware attacks. Unfortunately, current methods for identifying malware capabilities involve substantial manual reverse engineering efforts and context switching between multiple tools, which slows down an investigation and gives attackers an advantage. In this paper, we propose DEEPCAPA, an automated postdetection system that uses machine learning to identify potentially malicious capabilities in malware in the form of MITRE ATT&CK techniques. Our system operates on sequences of API calls, extracted from the memory snapshots taken at key points during the (sandboxed) execution of malware. Our results demonstrate that DEEPCAPA can accurately identify malicious capabilities, achieving a precision of 95.80% and a recall of 93.76% across 29 different techniques.more » « lessFree, publicly-accessible full text available December 9, 2025
-
De_Silva, Ravindu; Guo, Wenbo; Ruaro, Nicola; Grishchenko, Ilya; Kruegel, Christopher; Vigna, Giovanni (, 33rd USENIX Security Symposium (USENIX Security 24))
-
Su, Zihao; Cai, Kunlin; Beeler, Reuben; Dresel, Lukas; Garcia, Allan; Grishchenko, Ilya; Tian, Yuan; Kruegel, Christopher; Vigna, Giovanni (, 33rd USENIX Security Symposium (USENIX Security 24))
An official website of the United States government

Full Text Available