E0HYL / AI4Code-FrameworkLinks
A unified framework for AI-enhanced code analysis.
☆9Updated 2 years ago
Alternatives and similar repositories for AI4Code-Framework
Users that are interested in AI4Code-Framework are comparing it to the libraries listed below
Sorting:
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆58Updated last year
- A curated list of malware-related papers.☆30Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆88Updated 2 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆50Updated last year
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆146Updated last year
- ☆40Updated 4 years ago
- ☆11Updated last year
- ☆29Updated 10 months ago
- Seminar 2022☆21Updated 3 weeks ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 3 years ago
- the instructions about request access to AdvDroidZero☆12Updated last year
- This is the official repository for VulHawk.☆71Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆46Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- ☆40Updated last month
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆70Updated last year
- ☆21Updated 5 years ago
- ☆23Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 7 months ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- ☆19Updated 11 months ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆162Updated 3 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…