From: Using deep learning to solve computer security challenges: a survey
Topic | Paper | Source Available | Raw Data Available1 | Dataset Available 2 | Quality of Dataset | |
---|---|---|---|---|---|---|
Sample Num | Balance | |||||
PA | RFNBNN [9] | ✗ | ✓ | ✗ | N/A | N/A |
EKLAVYA [10] | ✗ | ✓ | ✗ | N/A | N/A | |
ROP | ROPNN [11] | ✗ | ✗ | ✗ | N/A | N/A |
HeNet [12] | ✗ | ✗ | ✗ | N/A | N/A | |
CFI | Barnum [13] | ✓ | ✗ | ✗ | N/A | N/A |
CFG-CNN [14] | ✓ | ✓ | ✗ | N/A | N/A | |
Network | 50b(yte)-CNN [15] | ✗ | ✓ | ✗ | 115835 | ✗ |
PCCN [16] | ✓ | ✓ | ✓ | 1168671 | ✗ | |
Malware | Rosenber [17] | ✗ | ✗ | ✗ | 500000 | ✓ |
DeLaRosa [18] | ✗ | ✗ | ✗ | 100000 | ✗ | |
LogEvent | DeepLog [8] | P3 | ✓ | P | N/A | ✗ |
LogAnom [41] | ✗ | ✓ | P | N/A | ✗ | |
MemoryFoensic | DeepMem [19] | ✓ | ✓ | ✓ | N/A | ✗ |
MDMF [48] | ✗ | ✗ | ✗ | N/A | ✗ | |
FUZZING | NeuZZ [20] | ✓ | ✗ | ✗ | N/A | N/A |
Learn & Fuzz | ✗ | ✗ | ✗ | N/A | N/A |