On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542
☆30Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for pdfclassifier
Users that are interested in pdfclassifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆86Nov 5, 2024Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- ☆15Dec 29, 2023Updated 2 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- ☆60Dec 5, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- Official implementation of the paper "From Optimization to Generalization: Fair Federated Learning against Quality Shift via Inter-Client…☆11Mar 13, 2025Updated last year
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆13Mar 22, 2024Updated 2 years ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Jan 4, 2020Updated 6 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Code for the ICML 2021 paper "Sharing Less is More: Lifelong Learning in Deep Networks with Selective Layer Transfer"☆12Aug 17, 2021Updated 4 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆199Aug 27, 2024Updated last year
- Tensorflow implementation of TrialAttack (Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems. KDD 20…☆12Sep 2, 2021Updated 4 years ago