Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)
☆14Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for robust-call-graph-malware-detection
Users that are interested in robust-call-graph-malware-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- ☆20May 27, 2020Updated 5 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- An end to end encrypted Messenger that uses the signal protocol over the I2P network☆12Jun 26, 2023Updated 2 years ago
- Official repository for AAAI'23 paper: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinf…☆30Nov 26, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- 🕵️♂️ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.☆15Apr 7, 2024Updated last year
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 2 years ago
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- ☆10Apr 27, 2021Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- 基于恶意样本的图像化,对恶意代码进行机器学习并进行检测☆11Mar 25, 2018Updated 7 years ago
- ☆11Nov 14, 2024Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆122Mar 10, 2025Updated last year
- Source code of Optimizing Coverage in a K-Covered and Connected Sensor Network Using Genetic Algorithms paper☆14Oct 19, 2020Updated 5 years ago
- 恶意软件检测系统后端代码☆12Nov 28, 2020Updated 5 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- cv-warpPolar-exampleは、OpenCVでの極座標変換/逆変換の実行例です。☆11Jul 11, 2020Updated 5 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- 基于奇安信的鹰图系统API的数据导出到excel的python程序☆30Apr 16, 2022Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Jittor implementation of Graph Convlution Networks☆17Jun 7, 2021Updated 4 years ago