"Beyond the Block: Exploiting Compressed Data Integrity in Modern Archivers" Premise: Investigate how modern compression formats (like Zstandardcap Z s t a n d a r d
Use AI-generated malware and compress it using different settings. Analyze if AI-generated, packed code has a distinct Shannon entropy or LZma structure compared to human-written code. neil.7z
A framework for detecting malicious code by analyzing the "difficulty" of compressing it, using compression ratios as a feature for security scanners. 3. Practical/Software Engineering Focus "Beyond the Block: Exploiting Compressed Data Integrity in