weisong-ucr / DeepMem
A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.
☆14Updated 5 years ago
Alternatives and similar repositories for DeepMem:
Users that are interested in DeepMem are comparing it to the libraries listed below
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- ☆11Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Additional code and data for the automated malware generation paper☆12Updated 10 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- ☆24Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆17Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆37Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- ☆22Updated last year
- PDF Malware Parser☆20Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆14Updated 6 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- ☆11Updated 6 months ago
- Research tool able to detect and mitigate evasion techniques used by malware in-the-wild☆11Updated 2 years ago
- ☆44Updated 2 years ago
- An Automated Vulnerability Detection System☆59Updated 8 years ago
- ☆77Updated 5 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago