Azure / 2021-machine-learning-security-evasion-competition
☆19Updated 3 years ago
Alternatives and similar repositories for 2021-machine-learning-security-evasion-competition
Users that are interested in 2021-machine-learning-security-evasion-competition are comparing it to the libraries listed below
Sorting:
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆79Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last week
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆221Updated last month
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆209Updated 5 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last month
- Transformer Neural Network from Dynamic Malware Detection☆30Updated 10 months ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- Pytorch implementation of MalConv☆72Updated 3 years ago
- A library for adversarial classifier evasion☆42Updated 10 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆18Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆12Updated 4 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Privacy Testing for Deep Learning☆204Updated last year
- Adversarial Malware Generator Using GANs☆54Updated 9 months ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- ☆24Updated 2 years ago
- ☆22Updated last year
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Security Weaknesses in Machine Learning☆15Updated last year