MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
☆45Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for MalScan
Users that are interested in MalScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆65Feb 21, 2024Updated 2 years ago
- revised☆23Jul 26, 2020Updated 5 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆95Sep 23, 2022Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆52Jul 4, 2019Updated 6 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- ☆43Aug 6, 2021Updated 4 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆39Aug 2, 2021Updated 4 years ago
- ☆14Apr 10, 2024Updated last year
- 使用安卓Opcode字节码的N-gram序列特征进行恶意软件检测的完全步骤,使用算法RF,KNN☆18Aug 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 提取安卓软件的n-gram特征☆24Aug 5, 2018Updated 7 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆59Mar 11, 2018Updated 8 years ago
- ☆29Jan 17, 2024Updated 2 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- Contains the code and data for our #ICSE2022 paper titled as "CodeFill: Multi-token Code Completion by Jointly Learning from Structure an…☆15May 18, 2022Updated 3 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 利用机器学习实现android恶意软件检测模型☆17Jul 31, 2019Updated 6 years ago
- GPLv2 tool that auto-reverse-engineers Android applications and rips out sensitive API calls. Its awesome.☆22Mar 25, 2013Updated 13 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- Code for Deep Android Malware Detection paper☆181Nov 25, 2017Updated 8 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated this week
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Mar 25, 2023Updated 3 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- Zero Trust Bitcoin Options on Ethereum☆12Jun 4, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- A self trained Controlnet model for controlling materials☆13Jun 30, 2024Updated last year
- ☆13May 13, 2025Updated 10 months ago
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- From-Classification-to-Clinical☆12Apr 26, 2024Updated last year
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago