JinLabIIT / MAGICLinks
☆12Updated 6 years ago
Alternatives and similar repositories for MAGIC
Users that are interested in MAGIC are comparing it to the libraries listed below
Sorting:
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆91Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆36Updated 3 years ago
- ☆20Updated 3 years ago
- ☆138Updated 7 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆58Updated 4 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆73Updated 3 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆22Updated 5 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆60Updated last year
- ☆16Updated 4 years ago
- Offical Implementation for PalmTree☆145Updated last year
- ☆31Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- ☆101Updated 4 years ago
- revised☆22Updated 5 years ago
- ☆16Updated 3 years ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆26Updated last year
- ☆41Updated last month
- This is the official repository for VulHawk.☆72Updated 2 years ago
- ☆12Updated 2 years ago
- ☆26Updated 6 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆80Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆82Updated 2 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆147Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆165Updated 5 months ago