☆18Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for DecodingMLSecretsOfWindowsMalwareClassification
Users that are interested in DecodingMLSecretsOfWindowsMalwareClassification are comparing it to the libraries listed below
Sorting:
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- ☆43Aug 6, 2021Updated 4 years ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆72Sep 28, 2024Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- Codee☆17Dec 9, 2020Updated 5 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- ☆41Mar 9, 2026Updated last week
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆84Sep 1, 2025Updated 6 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- ☆14May 14, 2018Updated 7 years ago
- This version of SDN Switch Emulator is deprecated. Please find the new version in (https://github.com/arunmir/sdn-sim3)☆14Oct 1, 2019Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- 深入浅出最优化系列博客代码 Code of Optimization in a Nutshell☆18Jan 19, 2022Updated 4 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Designed a digital communication system using QAM modulation on Octave with Symbol Timing and Carrier Frequency Recovery☆20Aug 22, 2017Updated 8 years ago
- Lite version of LibRadar☆43Apr 8, 2023Updated 2 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆52Jul 4, 2019Updated 6 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆34Aug 10, 2024Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- [AACL 2023] Official implementation of paper "Towards LLM-based Fact Verification on News Claims with a Hierarchical Step-by-Step Prompti…☆21Apr 1, 2024Updated last year
- ☆28Oct 21, 2020Updated 5 years ago
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- A script to scan files with VirusTotal☆12Apr 16, 2024Updated last year
- ☆164Oct 27, 2022Updated 3 years ago