Discovering Malicious Functionality through Binary Reconstruction
☆59Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for deepreflect
Users that are interested in deepreflect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated 2 years ago
- ☆57Oct 15, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Jun 30, 2022Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆95Sep 23, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- ☆32Jul 22, 2022Updated 3 years ago
- ☆45Mar 13, 2022Updated 4 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- An awesome & curated list of binary code similarity papers☆600Jan 5, 2026Updated 3 months ago
- Official repository for DeepBinDiff☆251Dec 7, 2021Updated 4 years ago
- ☆15Oct 24, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆51Jan 10, 2022Updated 4 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆139Jun 15, 2018Updated 7 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Elastic Malware Benchmark for Empowering Researchers☆1,141Nov 22, 2024Updated last year
- 毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;☆162Mar 30, 2023Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆175Dec 15, 2023Updated 2 years ago
- ☆309Jul 30, 2024Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- ☆14Feb 18, 2021Updated 5 years ago