CGCL-codes / MalTracker
☆11Updated 6 months ago
Alternatives and similar repositories for MalTracker:
Users that are interested in MalTracker are comparing it to the libraries listed below
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆74Updated 2 months ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆16Updated 10 months ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆127Updated 2 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆42Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆10Updated last year
- A curated list of malware-related papers.☆23Updated 11 months ago
- ☆24Updated 4 months ago
- ☆45Updated 6 years ago
- A collection of security papers on top-tier publications☆38Updated last week
- ☆36Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆44Updated 2 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆84Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆80Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆27Updated last week
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- Academic Papers about LLM Application on Security☆115Updated 7 months ago
- ☆24Updated 11 months ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆112Updated 3 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆30Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆43Updated 3 years ago
- ☆25Updated 11 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆219Updated 6 months ago
- Have fun with audit log analysis :)☆148Updated 8 months ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆126Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆63Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆302Updated 4 months ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆44Updated last year
- ☆54Updated last year
- VulDeePecker algorithm implemented in Python☆109Updated 5 years ago