Bowen-n / MCBGView external linksLinks
Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)
☆22Mar 17, 2022Updated 3 years ago
Alternatives and similar repositories for MCBG
Users that are interested in MCBG are comparing it to the libraries listed below
Sorting:
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆16Mar 14, 2025Updated 11 months ago
- angr中文版文档☆35Oct 27, 2018Updated 7 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆21Jan 24, 2022Updated 4 years ago
- ☆39Dec 31, 2025Updated last month
- Official repository for AAAI'23 paper: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinf…☆30Nov 26, 2022Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆119Jun 22, 2022Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- CFG explorer for binaries☆84Oct 29, 2024Updated last year
- Transformer Neural Network for Dynamic Malware Detection☆38Jan 29, 2026Updated 2 weeks ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- A neural approach to malware detection in portable executables☆79Mar 20, 2023Updated 2 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆167Oct 26, 2023Updated 2 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- ☆42Aug 6, 2021Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- ☆10Mar 31, 2022Updated 3 years ago
- A unique security module for the Linux operating system☆12Sep 17, 2024Updated last year
- malicious PowerShell script detection model☆41Aug 30, 2021Updated 4 years ago
- 东南大学信息技术相关领域交流平台☆10Oct 22, 2022Updated 3 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- This is the implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago