gnipping / Awesome-Malware-Related-PapersLinks
A curated list of malware-related papers.
☆32Updated last year
Alternatives and similar repositories for Awesome-Malware-Related-Papers
Users that are interested in Awesome-Malware-Related-Papers are comparing it to the libraries listed below
Sorting:
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆58Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆91Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆36Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- ☆41Updated last week
- ☆29Updated 11 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆71Updated 9 months ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆50Updated last year
- ☆11Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆50Updated 5 months ago
- This is the official repository for VulHawk.☆72Updated 2 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆147Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- ☆24Updated last year
- the instructions about request access to AdvDroidZero☆12Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆57Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆54Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 3 years ago
- ☆42Updated 4 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 9 months ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆14Updated 6 months ago
- ☆20Updated last year
- A collection of security papers on top-tier publications☆53Updated last month
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 3 months ago
- ☆16Updated 4 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- ☆18Updated last year
- ☆16Updated 4 years ago