fmind / euphony
Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
☆46Updated 5 years ago
Alternatives and similar repositories for euphony:
Users that are interested in euphony are comparing it to the libraries listed below
- ☆21Updated 4 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆83Updated 2 years ago
- revised☆21Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆55Updated last year
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆119Updated 2 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆13Updated 8 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Updated 7 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 9 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆34Updated 2 years ago
- ☆9Updated 8 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆85Updated 9 months ago
- Mining API-Level Features for Robust Malware Detection in Android☆24Updated 7 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 4 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Updated 4 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- Popular Android malware datasets☆154Updated 6 years ago
- ☆56Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- The scalable bug search for binaries☆68Updated 8 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆49Updated 10 months ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 4 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- Malware detection using the Drebin dataset☆20Updated last year
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆37Updated 2 years ago
- ☆44Updated 4 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 3 months ago