ucsb-seclab / packwareLinks
Effects of packers on machine-learning-based malware classifiers that use only static analysis
☆86Updated last year
Alternatives and similar repositories for packware
Users that are interested in packware are comparing it to the libraries listed below
Sorting:
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- ☆79Updated 5 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆67Updated 4 years ago
- ☆59Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Research tool able to detect and mitigate evasion techniques used by malware in-the-wild☆11Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆52Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 months ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆225Updated this week
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆19Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 4 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆82Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆177Updated last year
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆46Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆30Updated 2 years ago
- ☆50Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago