Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"
☆56May 14, 2024Updated last year
Alternatives and similar repositories for enhanced-binary-diversification
Users that are interested in enhanced-binary-diversification are comparing it to the libraries listed below
Sorting:
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆245Nov 27, 2025Updated 3 months ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 11 months ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- Dataset with labeled benign and malicious files 🗃️☆151Jul 19, 2023Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆15Nov 24, 2021Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Seminar 2022☆23Updated this week
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Elastic Malware Benchmark for Empowering Researchers☆1,137Nov 22, 2024Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- 基于深度学习的恶意软件 检测研究;MalConv;☆118Jun 22, 2022Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- ☆40Jun 11, 2025Updated 9 months ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- A large-scale database for graph representation learning☆55Oct 6, 2022Updated 3 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago