seclab-ucr / Themis
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆21Updated 2 years ago
Alternatives and similar repositories for Themis:
Users that are interested in Themis are comparing it to the libraries listed below
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆114Updated 3 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated 7 months ago
- ☆26Updated 6 months ago
- A collection of security papers on top-tier publications☆41Updated this week
- ☆15Updated 3 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆69Updated 8 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- FirmSec Dataset☆33Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆51Updated 2 months ago
- Additional code and data for the automated malware generation paper☆12Updated 10 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- ☆29Updated 7 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆156Updated 4 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated last year
- ☆33Updated 8 months ago
- ☆24Updated 5 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆53Updated 4 months ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year
- Recent Paper About Bug Detection☆31Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago