This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.
☆29Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A large-scale database of malicious software images☆51Aug 27, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Codes for AICS'2019 challenge problem☆22Oct 13, 2019Updated 6 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- ☆50Mar 10, 2016Updated 10 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆17Oct 9, 2023Updated 2 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆36Oct 6, 2022Updated 3 years ago
- ☆27May 27, 2020Updated 5 years ago
- 舆情分析系统后端☆11Jun 21, 2021Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- Jupyter Notebook for Natural Language Processing learning☆11Apr 28, 2017Updated 8 years ago
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- 网络安全/无线网络安全 论文阅读笔记归档☆13Oct 19, 2021Updated 4 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Program Vulnerability Repair via Inductive Inference☆21Dec 21, 2023Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- ☆13Dec 30, 2021Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago