eurecom-s3 / tangled_iot
The Tangled Genealogy of IoT Malware
☆10Updated 3 years ago
Related projects: ⓘ
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated last year
- ☆24Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆19Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆9Updated 3 years ago
- Additional code and data for the automated malware generation paper☆11Updated 4 months ago
- Codee☆17Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆31Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- Awesome list for asm2vec☆16Updated 3 years ago
- ☆15Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- ☆56Updated 11 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆82Updated 3 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 5 years ago
- ☆22Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆12Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆43Updated 5 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆13Updated 4 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- ☆43Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆17Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆20Updated 9 months ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆16Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆38Updated last year
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆11Updated 11 months ago