August 2019
Intermediate to advanced
342 pages
9h 35m
English
In the paper mentioned previously, an RL model is implemented to carry out a black-box attack against a malware detector, with the aim of evading a static Windows Portable Executable (PE) malware classifier.
The attack scenario includes the following elements:
The feedback and their scalar awards are then fed back to the agent. The agent determines his next action based on such feedback, following a strategy, that is, an objective function that ...
Read now
Unlock full access