csvl / SEMALinks
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆115Updated 3 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated last week
- ☆14Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- ☆43Updated last month
- ☆70Updated 2 years ago
- Practical Data-Only Attack Generation☆40Updated last year
- ☆36Updated last year
- Powershell script deobfuscation using AST in Python☆68Updated last year
- ☆102Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Dataset of packed PE samples☆35Updated 11 months ago
- Hardening code obfuscation against automated attacks☆133Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++