DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)
☆14Apr 22, 2024Updated last year
Alternatives and similar repositories for DRSM
Users that are interested in DRSM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Dataset with labeled benign and malicious files 🗃️☆151Jul 19, 2023Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 4 months ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆50Jan 10, 2022Updated 4 years ago
- ☆29Jan 17, 2024Updated 2 years ago
- Transformer Neural Network for Dynamic Malware Detection☆39Mar 5, 2026Updated 3 weeks ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Federated Learning based Android Malware Classification System☆27Feb 15, 2024Updated 2 years ago
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- ☆17Sep 23, 2024Updated last year
- Symbolic Execution Benchmarks for Ethereum Smart Contracts☆22Aug 22, 2024Updated last year
- Implementation of mixed language project compilation via Bazel platform.☆17Oct 10, 2020Updated 5 years ago
- ☆17May 27, 2021Updated 4 years ago
- A collection of security papers on top-tier publications☆61Mar 15, 2026Updated 2 weeks ago
- This is the implementation repository of our incoming ESEC/FSE 2021 paper: Exposing Numerical Bugs in Deep Learning via GradientBack-prop…☆15Oct 16, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- Code and data of HRGraph, accepted to KaLLM workshop at ACL 2024.☆18Sep 29, 2024Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Apr 15, 2025Updated 11 months ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆15Nov 24, 2021Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆19Jul 15, 2024Updated last year
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆18Dec 10, 2024Updated last year
- Here is the replication of the paper Probabilistic Delta Debugging, which has been accepted by ESEC/FSE 2021. More details can be found i…☆19Aug 2, 2021Updated 4 years ago
- ☆23Mar 11, 2025Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- ☆32Oct 15, 2025Updated 5 months ago