Use AI-generated malware and compress it using different settings. Analyze if AI-generated, packed code has a distinct Shannon entropy or LZma structure compared to human-written code.
Analyze the 7zip failure case where malicious websites impersonated 7-zip.org . The paper would investigate how to create a blockchain-based or decentralized signing system that prevents users from downloading compromised software from "mirror" sites.
"The Ghost in the Archive: Detecting AI-Generated Malware via 7z Entropy Analysis"
Which direction sounds most interesting to you? I can help you outline the , abstract , or key findings for any of these. i dove down the 7z rabbit hole (it goes deep)
This paper would detail how a "zero-size" stream can wrap integers and cause memory corruption. It would argue for the need for sandboxed decompression or safer library wrappers for compression, moving beyond traditional signature-based malware detection. 2. Information Theory/AI Focus
"Trusting the Mirror: An Analysis of Malvertising in Software Repositories"
Neil.7z Now
Use AI-generated malware and compress it using different settings. Analyze if AI-generated, packed code has a distinct Shannon entropy or LZma structure compared to human-written code.
Analyze the 7zip failure case where malicious websites impersonated 7-zip.org . The paper would investigate how to create a blockchain-based or decentralized signing system that prevents users from downloading compromised software from "mirror" sites. neil.7z
"The Ghost in the Archive: Detecting AI-Generated Malware via 7z Entropy Analysis" Use AI-generated malware and compress it using different
Which direction sounds most interesting to you? I can help you outline the , abstract , or key findings for any of these. i dove down the 7z rabbit hole (it goes deep) The paper would investigate how to create a
This paper would detail how a "zero-size" stream can wrap integers and cause memory corruption. It would argue for the need for sandboxed decompression or safer library wrappers for compression, moving beyond traditional signature-based malware detection. 2. Information Theory/AI Focus
"Trusting the Mirror: An Analysis of Malvertising in Software Repositories"