Existing detection methods face a fundamental limitation: they can identify where suspicious code exists, but struggle to accurately explain what it actually does.
| Capability | MalGuard | GuardDog | CHASE |
|---|---|---|---|
| Detection Performance | Strong | Limited | Strong |
| Where is suspicious? | |||
| What does it do? | Conditional* | Conditional* |
* MalGuard and GuardDog generate explanations by mapping detected function names to pre-written descriptions. While useful, this provides a post-hoc summary of known suspicious patterns. In contrast, CHASE actively intervenes on code by deobfuscating layered payloads and reasoning over analysis traces to reveal the true intent.
CHASE actively deobfuscates layered payloads and retrieves remote content to reveal the attacker's true intent, producing high-fidelity, actionable reports that include:
- Attack chain reconstruction
- Attacker's ultimate goal
- Indicators of Compromise (IoCs)