surrealyz / pdfclassifier
On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542
☆29Updated 3 years ago
Alternatives and similar repositories for pdfclassifier:
Users that are interested in pdfclassifier are comparing it to the libraries listed below
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- ☆22Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last week
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated 11 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- ☆26Updated 7 months ago
- ☆11Updated 9 months ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆68Updated last year
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Additional code and data for the automated malware generation paper☆12Updated 11 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- A curated list of malware-related papers.☆27Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- ☆15Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- the instructions about request access to AdvDroidZero☆11Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- ☆44Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆55Updated 5 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆85Updated 2 years ago
- ☆16Updated 4 years ago