surrealyz / pdfclassifierLinks
On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542
☆30Updated 4 years ago
Alternatives and similar repositories for pdfclassifier
Users that are interested in pdfclassifier are comparing it to the libraries listed below
Sorting:
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- ☆11Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 5 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 9 months ago
- ☆27Updated 2 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆74Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- ☆10Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Updated 7 years ago
- The scalable bug search for binaries☆71Updated 9 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆26Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Updated 4 years ago
- ☆139Updated 7 years ago
- ☆55Updated 6 years ago