yuxiaorun / MalConv-AdversarialView external linksLinks
Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf
☆19May 21, 2018Updated 7 years ago
Alternatives and similar repositories for MalConv-Adversarial
Users that are interested in MalConv-Adversarial are comparing it to the libraries listed below
Sorting:
- 基于深度学习的恶意软件检测研究;MalConv;☆119Jun 22, 2022Updated 3 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆13Aug 31, 2024Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Malware Classification using Machine learning☆76Nov 9, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆38Aug 8, 2024Updated last year
- A neural approach to malware detection in portable executables☆79Mar 20, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41May 4, 2024Updated last year
- NTU CSIE Video Communications☆11Jul 3, 2018Updated 7 years ago
- Permutation Equivariant Lorentz Invariant/Covariant Aggregator Network☆13Oct 28, 2024Updated last year
- Python SSDeep wrapper☆11Aug 21, 2018Updated 7 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- Jupyter notebooks for the book "Deep Learning with Python"☆11Aug 24, 2020Updated 5 years ago