Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
☆144Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for CADE
Users that are interested in CADE are comparing it to the libraries listed below
Sorting:
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆28Jan 17, 2024Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- ☆24Nov 9, 2020Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- ☆29May 6, 2021Updated 4 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 11 months ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- ☆16Oct 23, 2019Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- ☆11Jul 8, 2024Updated last year
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- ☆37Jun 10, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- ☆27Aug 6, 2023Updated 2 years ago
- ☆55Nov 3, 2019Updated 6 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago