[code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang and Guanhua Yan. In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2022)
☆39Aug 2, 2022Updated 3 years ago
Alternatives and similar repositories for CFGExplainer
Users that are interested in CFGExplainer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆95Sep 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆43Aug 6, 2021Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- CFG based program similarity using Graph Neural Networks☆36Mar 21, 2023Updated 3 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆39Aug 2, 2021Updated 4 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated last year
- A library to generate AST, CFG, PDG for Java program☆15Jun 13, 2021Updated 4 years ago
- ☆30Dec 19, 2024Updated last year
- ☆18Mar 15, 2024Updated 2 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆18Jun 22, 2020Updated 5 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆67Feb 21, 2024Updated 2 years ago
- A Survey of Deep Learning Models for Structural Code Understanding☆21May 12, 2022Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- ☆12Sep 29, 2019Updated 6 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- ☆13Oct 19, 2023Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆24Aug 8, 2025Updated 8 months ago
- Dataset with labeled benign and malicious files 🗃️☆154Jul 19, 2023Updated 2 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- ☆20May 27, 2020Updated 5 years ago