jun521ju / IEEE_SP_2022_WtaGraph
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆16Updated 3 years ago
Related projects: ⓘ
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Additional code and data for the automated malware generation paper☆11Updated 4 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆34Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆17Updated 2 years ago
- A collection of security papers on top-tier publications☆35Updated this week
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- ☆16Updated 2 years ago
- ☆30Updated 2 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- ☆15Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆38Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆19Updated 2 years ago
- ☆21Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆31Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆56Updated 2 months ago
- A Knowledge Graph for Open Source Security Tools☆14Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆38Updated 2 years ago
- Android third-party library Detection☆16Updated 4 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆22Updated 9 months ago
- A framework for synthesizing lateral movement login data.☆20Updated 3 years ago
- ☆15Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆54Updated 2 years ago
- ☆65Updated this week
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆89Updated last week
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆28Updated 5 years ago
- A curated list of malware-related papers.☆21Updated 6 months ago