seclab-ucr / Themis
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆20Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Themis
- ☆30Updated 4 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- ☆14Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆67Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆59Updated 3 months ago
- ☆14Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆129Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ☆23Updated 2 months ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- Academic Papers about LLM Application on Security☆109Updated 5 months ago
- The project is to detect malware traffic in TLS flows using ML☆32Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13Updated 6 months ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- ☆19Updated 5 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆11Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- ☆24Updated 2 months ago
- A collection of security papers on top-tier publications☆35Updated last month
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆20Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆142Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Updated 7 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆117Updated 3 weeks ago
- AI Model Security Reading Notes☆35Updated 3 months ago
- ☆96Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆59Updated 2 years ago