Discovering Malicious Functionality through Binary Reconstruction
☆59Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for deepreflect
Users that are interested in deepreflect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆35Jan 9, 2023Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 11 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆93Mar 31, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆57Oct 15, 2020Updated 5 years ago
- Offical Implementation for PalmTree☆151Jan 29, 2024Updated 2 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆95Sep 23, 2022Updated 3 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- ☆32Jul 22, 2022Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- ☆45Mar 13, 2022Updated 4 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆146Mar 25, 2023Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- An awesome & curated list of binary code similarity papers☆602Jan 5, 2026Updated 3 months ago
- Official repository for DeepBinDiff☆252Dec 7, 2021Updated 4 years ago
- ☆15Oct 24, 2023Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆51Jan 10, 2022Updated 4 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆139Jun 15, 2018Updated 7 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆103Dec 18, 2023Updated 2 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- 毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;☆161Mar 30, 2023Updated 3 years ago