Azure / 2020-machine-learning-security-evasion-competition
2020 Machine Learning Security Evasion Competition
☆49Updated 4 years ago
Alternatives and similar repositories for 2020-machine-learning-security-evasion-competition:
Users that are interested in 2020-machine-learning-security-evasion-competition are comparing it to the libraries listed below
- ☆77Updated 5 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated 11 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆85Updated 9 months ago
- Automated Yara Rule generation using Biclustering☆66Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆217Updated last month
- Pytorch implementation of MalConv☆72Updated 3 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆22Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆70Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆77Updated 11 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- ☆35Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆38Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- ☆19Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆18Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆49Updated 10 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- ☆58Updated 3 years ago
- ☆14Updated 6 years ago
- Framework for Adversarial Malware Evaluation.☆33Updated last year
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆21Updated 3 years ago