JinLabIIT / MAGIC
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for MAGIC
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆41Updated 2 years ago
- The scalable bug search for binaries☆66Updated 7 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆78Updated 2 years ago
- ☆136Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- ☆16Updated 2 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 6 years ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆50Updated 9 months ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆68Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- Usenix Security'23☆13Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆102Updated 5 years ago
- ☆21Updated 4 years ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- revised☆20Updated 4 years ago
- This is the official repository for VulHawk.☆65Updated last year
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆29Updated 2 years ago
- ☆18Updated 2 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆68Updated 2 years ago
- A curated list of malware-related papers.☆22Updated 8 months ago
- ☆96Updated 3 years ago
- ☆90Updated last year
- ☆14Updated 3 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆18Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- Codee☆17Updated 3 years ago
- Full implementaion of Genius☆30Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year