DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)
☆14Apr 22, 2024Updated last year
Alternatives and similar repositories for DRSM
Users that are interested in DRSM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dataset with labeled benign and malicious files 🗃️☆154Jul 19, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆51Jan 10, 2022Updated 4 years ago
- ☆29Jan 17, 2024Updated 2 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- A Federated Learning based Android Malware Classification System☆27Feb 15, 2024Updated 2 years ago
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- A large-scale database for graph representation learning☆54Oct 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Runs interdependent logic concurrently, starting each function when predecessors have completed☆21Apr 17, 2025Updated last year
- Symbolic Execution Benchmarks for Ethereum Smart Contracts☆22Aug 22, 2024Updated last year
- Implementation of mixed language project compilation via Bazel platform.☆17Oct 10, 2020Updated 5 years ago
- Jupyter Notebook for Natural Language Processing learning☆11Apr 28, 2017Updated 8 years ago
- ☆18May 27, 2021Updated 4 years ago
- A collection of security papers on top-tier publications☆64Apr 3, 2026Updated 2 weeks ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- Code and data of HRGraph, accepted to KaLLM workshop at ACL 2024.☆18Sep 29, 2024Updated last year
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The CKKS Encryption implementation for Rust☆11Feb 19, 2021Updated 5 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆18Jul 15, 2024Updated last year
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆18Dec 10, 2024Updated last year
- Here is the replication of the paper Probabilistic Delta Debugging, which has been accepted by ESEC/FSE 2021. More details can be found i…☆19Aug 2, 2021Updated 4 years ago
- 京东天猫商品评论爬取及分析系统☆15May 25, 2019Updated 6 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆79Oct 8, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆34Oct 15, 2025Updated 6 months ago
- enchmarking Large Language Models' Resistance to Malicious Code☆15Dec 1, 2024Updated last year
- text mining, regex, N-grams, fuzzy matching☆13Jan 22, 2021Updated 5 years ago
- ☆41Dec 9, 2025Updated 4 months ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- Fake image detection model that can also classify which GAN was used to generate the fake images☆22May 29, 2022Updated 3 years ago