JinLabIIT / MAGICLinks
☆12Updated 6 years ago
Alternatives and similar repositories for MAGIC
Users that are interested in MAGIC are comparing it to the libraries listed below
Sorting:
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- ☆139Updated 7 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Updated 3 years ago
- ☆21Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Updated 2 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆64Updated last year
- The scalable bug search for binaries☆71Updated 9 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 5 years ago
- ☆102Updated 5 years ago
- Offical Implementation for PalmTree☆147Updated 2 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Updated 2 years ago
- ☆16Updated 4 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆176Updated 9 months ago
- ☆16Updated 3 years ago
- VulDeePecker algorithm implemented in Python☆113Updated 6 years ago
- ☆43Updated 5 months ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Updated 4 years ago
- ☆123Updated 2 years ago
- revised☆22Updated 5 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Updated 2 years ago
- ☆20Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆344Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Updated last year
- ☆50Updated 7 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Updated 2 years ago
- ☆32Updated 3 years ago