gnipping / Awesome-Malware-Related-Papers
A curated list of malware-related papers.
☆21Updated 6 months ago
Related projects: ⓘ
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆42Updated 11 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆75Updated last year
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆49Updated 6 months ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆25Updated last year
- This is the official repository for VulHawk.☆65Updated last year
- ☆21Updated 3 weeks ago
- ☆30Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆31Updated 2 years ago
- Additional code and data for the automated malware generation paper☆11Updated 4 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆38Updated 2 years ago
- ☆21Updated 4 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆40Updated last year
- the instructions about request access to AdvDroidZero☆10Updated 5 months ago
- Seminar 2022☆20Updated last month
- A collection of security papers on top-tier publications☆35Updated this week
- ☆14Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆56Updated 3 weeks ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆57Updated 11 months ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆17Updated 2 years ago
- The scalable bug search for binaries☆66Updated 7 years ago
- revised☆20Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆66Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆31Updated this week
- ☆15Updated 8 months ago
- A new version used Androguard but not Soot to realize MaMadroid。☆18Updated 3 years ago
- ☆18Updated 2 weeks ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆67Updated last year
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆40Updated 4 years ago