nuwuxian / MORSELinks
☆11Updated last year
Alternatives and similar repositories for MORSE
Users that are interested in MORSE are comparing it to the libraries listed below
Sorting:
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 5 years ago
- A curated list of malware-related papers.☆34Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- ☆18Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆74Updated 2 years ago
- the instructions about request access to AdvDroidZero☆13Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆62Updated last year
- ☆27Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆15Updated 10 months ago
- ☆43Updated 4 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆55Updated 2 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Updated 3 years ago
- ☆24Updated 5 years ago
- ☆18Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 9 months ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- ☆32Updated 2 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Updated 2 years ago
- This is the official repository for VulHawk.☆74Updated 2 years ago
- adversarial malware detection via a principled way☆23Updated 2 years ago
- The scalable bug search for binaries☆71Updated 9 years ago