{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T04:20:13Z","timestamp":1727756413385},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"value":"9781643685434","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,25]]},"abstract":"<jats:p>In the recent years, there has been a strong concern over the robustness of machine learning systems, specially when working in critical systems. One of such critical domains is cybersecurity, and a particular example is malware detection. This works aims to provide a formal technique to check the robustness of neural networks applied to the detection of malware. The technique is based on the automatic translation of the neural network to an equivalent set of equations that can be subsequently rigorously analyzed with respect to certain conditions for its input and output. That is, given a particular input for the neural network, check if there exist slight variations of such an input that can modify the output of the neural network. As a case study, we present preliminary results of a robustness analysis for a neural network that detects Windows PE malware. The results of the robustness analysis can be used to certify the robustness of the classifier or for improving such a classifier by fixing the flaws detected.<\/jats:p>","DOI":"10.3233\/faia240418","type":"book-chapter","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T09:48:04Z","timestamp":1727689684000},"source":"Crossref","is-referenced-by-count":0,"title":["Checking Robustness of Neural Network Models for the Classification of Malware"],"prefix":"10.3233","author":[{"given":"Teresa","family":"Alsinet","sequence":"first","affiliation":[{"name":"Universitat de Lleida"}]},{"given":"Josep","family":"Argelich","sequence":"additional","affiliation":[{"name":"Universitat de Lleida"}]},{"given":"Ramon","family":"Bejar","sequence":"additional","affiliation":[{"name":"Universitat de Lleida"}]},{"given":"Antonio","family":"Morgado","sequence":"additional","affiliation":[{"name":"INESC-ID\/IST Universidade de Lisboa"}]},{"given":"Jordi","family":"Planes","sequence":"additional","affiliation":[{"name":"Universitat de Lleida"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Artificial Intelligence Research and Development"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA240418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T09:48:04Z","timestamp":1727689684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA240418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,25]]},"ISBN":["9781643685434"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia240418","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,25]]}}}