Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
☆52Jul 4, 2019Updated 6 years ago
Alternatives and similar repositories for euphony
Users that are interested in euphony are comparing it to the libraries listed below
Sorting:
- ☆24Apr 17, 2020Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Mining API-Level Features for Robust Malware Detection in Android☆24Jan 10, 2018Updated 8 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆45Apr 24, 2020Updated 5 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆66May 6, 2019Updated 6 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- Popular Android malware datasets☆171Oct 10, 2018Updated 7 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- revised☆23Jul 26, 2020Updated 5 years ago
- ☆44Oct 15, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated last year
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- Tool for leaking and bypassing Android malware detection system☆297Sep 15, 2017Updated 8 years ago
- Android Security☆29Mar 14, 2014Updated 12 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- axplorer - Android Permission Mappings☆115May 7, 2020Updated 5 years ago