jinxmirror13 / BETH_Dataset_Analysis
☆14Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for BETH_Dataset_Analysis
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆11Updated 2 months ago
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 3 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 7 months ago
- ☆15Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 2 years ago
- ☆29Updated 8 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆75Updated 4 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆42Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆33Updated last year
- ☆13Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated last month
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆21Updated last year
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆16Updated 3 years ago
- Central repo for talks and presentations☆43Updated 4 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- ☆19Updated 3 years ago
- GPT-3 use cases for Cybersecurity☆51Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆25Updated 5 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- Adversarial Malware Generator Using GANs☆52Updated 3 months ago
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago