DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)
☆14Apr 22, 2024Updated last year
Alternatives and similar repositories for DRSM
Users that are interested in DRSM are comparing it to the libraries listed below
Sorting:
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- ☆18Apr 4, 2021Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Jan 10, 2022Updated 4 years ago
- ☆27Jan 17, 2024Updated 2 years ago
- Transformer Neural Network for Dynamic Malware Detection☆38Jan 29, 2026Updated last month
- zkSnark circuit compiler☆12Feb 19, 2026Updated 2 weeks ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆11Mar 31, 2023Updated 2 years ago
- Repository containing the PhD Thesis "Formal Verification of Deep Reinforcement Learning Agents"☆11Aug 29, 2022Updated 3 years ago
- オリジナルの漢字テストを作成するWebアプリ☆12Mar 5, 2024Updated 2 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- ☆12Nov 26, 2019Updated 6 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- An implementation of vdist2vec model in paper A Learning Based Approach to Predict Shortest-Path Distances☆11Apr 8, 2022Updated 3 years ago
- BandMaxSAT: Multi-armed Bandit for the Local Search MaxSAT Solver☆11Mar 28, 2023Updated 2 years ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- The Zero Knowledge Whitelist Tool is a powerful utility for managing an address whitelist using Zero-Knowledge (ZK) proofs.☆11Oct 3, 2025Updated 5 months ago
- A collection of security papers on top-tier publications☆60Updated this week
- Circom circuits library for magnificent ZK applications☆14Jun 4, 2025Updated 9 months ago
- ☆11Jan 14, 2025Updated last year
- Verification of the gnark implementation of the Semaphore protocol using Reilabs' extractor to Lean.☆15Mar 3, 2024Updated 2 years ago
- A Trip planner that actually does trip planning☆12Oct 15, 2022Updated 3 years ago
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆20Updated this week
- The zero knowledge proof system used in Delta.