ClonedOne / MalwareBackdoors
Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
☆57Updated 2 years ago
Alternatives and similar repositories for MalwareBackdoors:
Users that are interested in MalwareBackdoors are comparing it to the libraries listed below
- ☆18Updated last year
- adversarial malware detection via a principled way☆20Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆49Updated 9 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆65Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- A curated list of malware-related papers.☆23Updated last year
- the instructions about request access to AdvDroidZero☆11Updated 10 months ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆12Updated 10 months ago
- ☆11Updated 7 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆42Updated last year
- ☆64Updated 4 years ago
- ☆15Updated 3 years ago
- ☆17Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆44Updated 3 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated 9 months ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- Seminar 2022☆22Updated 3 weeks ago
- ☆17Updated 3 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆13Updated 2 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 4 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆53Updated last year
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated 3 months ago
- ☆19Updated 11 months ago