JinLabIIT / MAGIC
☆12Updated 4 years ago
Related projects: ⓘ
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆38Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆75Updated last year
- The scalable bug search for binaries☆66Updated 7 years ago
- ☆136Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆49Updated 7 months ago
- ☆14Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆31Updated 2 years ago
- A curated list of malware-related papers.☆21Updated 6 months ago
- revised☆20Updated 4 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆18Updated 3 years ago
- ☆18Updated 2 weeks ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- ☆21Updated 4 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆42Updated 11 months ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆52Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆66Updated 2 years ago
- ☆24Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆17Updated 2 years ago
- ☆9Updated 7 years ago
- ☆95Updated 3 years ago
- ☆82Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆56Updated last month
- ☆14Updated 3 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆30Updated 3 years ago
- This is the official repository for VulHawk.☆65Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆100Updated 5 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆67Updated last year
- Usenix Security'23☆13Updated last year
- ☆18Updated 3 years ago