On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542
☆30Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for pdfclassifier
Users that are interested in pdfclassifier are comparing it to the libraries listed below
Sorting:
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- ☆13Aug 31, 2024Updated last year
- ☆11Aug 10, 2021Updated 4 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆36Nov 22, 2023Updated 2 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- A general method for training cost-sensitive robust classifier☆22May 29, 2019Updated 6 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Sep 25, 2024Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- ☆27Jul 14, 2019Updated 6 years ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- ☆68Sep 29, 2020Updated 5 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆45Jan 5, 2026Updated last month
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Jan 4, 2020Updated 6 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆198Aug 27, 2024Updated last year
- A music composer and player with MATLAB☆11Mar 14, 2020Updated 5 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- ☆10Mar 24, 2025Updated 11 months ago
- Collection of slides☆33Aug 20, 2025Updated 6 months ago
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- ☆86Nov 5, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago