Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojan, sandbox analysis, threat intel
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
14.7
ms
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
💾
Binary Analysis
arxiv.org
·
21h
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
💾
Binary Analysis
arxiv.org
·
2d
Detecting Concept
Drift
in Evolving Malware Families Using Rule-Based
Classifier
Representations
💾
Binary Analysis
arxiv.org
·
3d
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
💾
Binary Analysis
arxiv.org
·
2d
Which Face and Whose Identity? Solving the Dual Challenge of Deepfake
Proactive
Forensics
in Multi-Face Scenarios
🧩
Intermediate Representation
arxiv.org
·
21h
Adversarial
Co-Evolution of Malware and Detection Models: A
Bilevel
Optimization Perspective
🎲
Fuzzing
arxiv.org
·
3d
Advanced
Anomaly
Detection and Threat Intelligence in Zero Trust
IoT
Environments Using Machine Learning
📟
Firmware Analysis
arxiv.org
·
2d
GIFGuard
: Proactive Forensics against Deepfakes in Facial GIFs via Spatiotemporal
Watermarking
🔍
Memory Forensics
arxiv.org
·
21h
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🐧
Kernel Exploitation
arxiv.org
·
2d
AlphaJet
: Automated Conceptual Aircraft Synthesis via
Disentangled
Generative Priors and Topology-Preserving Evolutionary Search
🎲
Fuzzing
arxiv.org
·
21h
Adversarial Evasion in
Non-Stationary
Malware Detection:
Minimizing
Drift Signals through Similarity-Constrained Perturbations
🎲
Fuzzing
arxiv.org
·
6d
Dynamic
Cyber
Ranges
🛡️
Exploit Mitigations
arxiv.org
·
2d
Cheeger
--
Hodge
Contrastive Learning for Structurally Robust Graph Representation Learning
🧩
Intermediate Representation
arxiv.org
·
21h
Adversarial Malware Generation in Linux ELF
Binaries
via Semantic-Preserving
Transformations
💾
Binary Analysis
arxiv.org
·
3d
Self-Supervised
Learning for Android Malware Detection on a
Time-Stamped
Dataset
🐧
Kernel Exploitation
arxiv.org
·
2d
3D-LENS: A 3D
Lifting-based
Elevated
Novel-view Synthesis method for Single-View Aerial-Ground Re-Identification
🧩
Intermediate Representation
arxiv.org
·
21h
When the Agent Is the
Adversary
: Architectural Requirements for Agentic AI
Containment
After the April 2026 Frontier Model Escape
🛡️
Exploit Mitigations
arxiv.org
·
2d
·
Hacker News
Image-Based Malware Type Classification on
MalNet-Image
Tiny: Effects of Multi-Scale Fusion, Transfer Learning, Data Augmentation, and Schedule-Free
Optimizatio
...
🎲
Fuzzing
arxiv.org
·
6d
Topology-Aware
Representation Alignment for
Semi-Supervised
Vision-Language Learning
🧩
Intermediate Representation
arxiv.org
·
21h
ARCANE
: Cross-Campaign Attacker Re-identification via Passive Beacon
Telemetry
-- A Bayesian Network Framework for Longitudinal Cyber Attribution
🛡️
Exploit Mitigations
arxiv.org
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help