fmind / euphony
Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
☆47Updated 5 years ago
Alternatives and similar repositories for euphony:
Users that are interested in euphony are comparing it to the libraries listed below
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- ☆21Updated 5 years ago
- revised☆22Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆85Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆57Updated last year
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Updated 7 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆121Updated 2 years ago
- Mining API-Level Features for Robust Malware Detection in Android☆24Updated 7 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Updated 4 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Updated 8 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- IoT Security Reading List☆62Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Popular Android malware datasets☆154Updated 6 years ago
- ☆9Updated 8 years ago
- ☆37Updated 3 years ago
- Structural Analysis and Detection of Android Malware☆77Updated 10 months ago
- the instructions about request access to AdvDroidZero☆11Updated last year
- ☆22Updated last year
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- ☆43Updated 4 years ago
- ☆44Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 4 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago