Discovering Malicious Functionality through Binary Reconstruction
☆58Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for deepreflect
Users that are interested in deepreflect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆35Jan 9, 2023Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123May 18, 2025Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆94Mar 31, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆57Oct 15, 2020Updated 5 years ago
- Offical Implementation for PalmTree☆149Jan 29, 2024Updated 2 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆96Sep 23, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆40Aug 2, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆50Dec 19, 2020Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated 2 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆12Aug 20, 2024Updated last year
- ☆32Jul 22, 2022Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆147Mar 25, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- An awesome & curated list of binary code similarity papers☆603Jan 5, 2026Updated 4 months ago
- Official repository for DeepBinDiff☆251Dec 7, 2021Updated 4 years ago
- ☆15Oct 24, 2023Updated 2 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆103Dec 18, 2023Updated 2 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- 毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;☆161Mar 30, 2023Updated 3 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,157Nov 22, 2024Updated last year
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- ☆14Feb 18, 2021Updated 5 years ago