| Magika: AI-Powered Content-Type Detection | Sep 18, 2024 | CPUMalware Analysis | CodeCode Available | 11 | 5 |
| EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware Classifiers | Jun 5, 2025 | Malware AnalysisMalware Classification | CodeCode Available | 2 | 5 |
| Is Function Similarity Over-Engineered? Building a Benchmark | Oct 30, 2024 | Malware AnalysisVulnerability Detection | CodeCode Available | 1 | 5 |
| Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations | Aug 20, 2022 | Hybrid Machine LearningMalware Analysis | CodeCode Available | 1 | 5 |
| CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security Data | Mar 12, 2025 | Adversarial AttackMalware Analysis | CodeCode Available | 1 | 5 |
| Avast-CTU Public CAPE Dataset | Sep 6, 2022 | Malware AnalysisMalware Detection | CodeCode Available | 1 | 5 |
| DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World Scenarios | May 16, 2025 | Malware Analysis | CodeCode Available | 1 | 5 |
| FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis | Aug 10, 2023 | Malware AnalysisMulti-Task Learning | CodeCode Available | 1 | 5 |
| Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model | Dec 14, 2020 | Deep LearningFeature Engineering | CodeCode Available | 1 | 5 |
| Nebula: Self-Attention for Dynamic Malware Analysis | Sep 19, 2023 | Malware AnalysisMalware Classification | CodeCode Available | 1 | 5 |
| Revisiting Deep Learning for Variable Type Recovery | Apr 7, 2023 | DecoderDeep Learning | CodeCode Available | 0 | 5 |
| KiloGrams: Very Large N-Grams for Malware Classification | Aug 1, 2019 | ClassificationGeneral Classification | CodeCode Available | 0 | 5 |
| SAFE: Self-Attentive Function Embeddings for Binary Similarity | Nov 13, 2018 | Malware AnalysisVulnerability Detection | CodeCode Available | 0 | 5 |
| SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning | Jul 9, 2021 | BIG-bench Machine LearningCode Reuse Detection | CodeCode Available | 0 | 5 |
| Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network | Dec 24, 2019 | ClassificationGeneral Classification | CodeCode Available | 0 | 5 |
| On Ensemble Learning | Mar 7, 2021 | BIG-bench Machine LearningEnsemble Learning | CodeCode Available | 0 | 5 |
| Malware triage for early identification of Advanced Persistent Threat activities | Oct 16, 2018 | Malware Analysis | CodeCode Available | 0 | 5 |
| Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis | Jan 27, 2020 | BIG-bench Machine LearningInterpretable Machine Learning | CodeCode Available | 0 | 5 |
| Dynamic Malware Analysis with Feature Engineering and Feature Learning | Jul 17, 2019 | Feature EngineeringMalware Analysis | CodeCode Available | 0 | 5 |
| A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis | Dec 23, 2018 | Malware Analysis | CodeCode Available | 0 | 5 |
| Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets | Jun 2, 2024 | Graph Neural NetworkGraph Representation Learning | CodeCode Available | 0 | 5 |
| Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery | Jun 15, 2021 | BIG-bench Machine LearningMalware Analysis | CodeCode Available | 0 | 5 |
| AndrODet: An Adaptive Android Obfuscation Detector | Jan 1, 2019 | Android Malware DetectionMalware Analysis | CodeCode Available | 0 | 5 |
| Large Language Models for Cyber Security: A Systematic Literature Review | May 8, 2024 | Explainable ModelsIntrusion Detection | CodeCode Available | 0 | 5 |
| Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique | Oct 24, 2019 | Feature Engineeringfeature selection | CodeCode Available | 0 | 5 |
| Threat Behavior Textual Search by Attention Graph Isomorphism | Apr 16, 2024 | AttributeMalware Analysis | CodeCode Available | 0 | 5 |
| Reliable Malware Analysis and Detection using Topology Data Analysis | Nov 3, 2022 | Intrusion DetectionMalware Analysis | CodeCode Available | 0 | 5 |
| GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection | Sep 29, 2021 | Contrastive LearningDenoising | —Unverified | 0 | 0 |
| From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?) | Dec 5, 2022 | ClassificationMalware Analysis | —Unverified | 0 | 0 |
| Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code | Apr 2, 2025 | Malware AnalysisObfuscation Detection | —Unverified | 0 | 0 |
| LAMD: Context-driven Android Malware Detection and Classification with LLMs | Feb 18, 2025 | Android Malware DetectionMalware Analysis | —Unverified | 0 | 0 |
| Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering | Apr 7, 2025 | Language ModelingLanguage Modelling | —Unverified | 0 | 0 |
| Learning Malware Representation based on Execution Sequences | Dec 16, 2019 | Malware Analysis | —Unverified | 0 | 0 |
| Leveraging Artificial Intelligence on Binary Code Comprehension | Oct 11, 2022 | Compiler OptimizationMalware Analysis | —Unverified | 0 | 0 |
| Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection | Jul 1, 2020 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| MAIL: Malware Analysis Intermediate Language | Nov 6, 2022 | Malware Analysis | —Unverified | 0 | 0 |
| Malware analysis assisted by AI with R2AI | Apr 10, 2025 | Malware Analysis | —Unverified | 0 | 0 |
| Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability | Jul 23, 2021 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| Malware Analysis with Symbolic Execution and Graph Kernel | Apr 12, 2022 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 | 0 |
| Malware Detection using Artificial Bee Colony Algorithm | Dec 1, 2020 | feature selectionMalware Analysis | —Unverified | 0 | 0 |
| Malware Detection using Machine Learning and Deep Learning | Apr 4, 2019 | BIG-bench Machine LearningDeep Learning | —Unverified | 0 | 0 |
| ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation | Aug 30, 2021 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System Calls | Feb 15, 2018 | BIG-bench Machine LearningDocument Classification | —Unverified | 0 | 0 |
| On Benchmarking Code LLMs for Android Malware Analysis | Apr 1, 2025 | BenchmarkingMalware Analysis | —Unverified | 0 | 0 |
| On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors | Sep 25, 2023 | Ensemble LearningMalware Analysis | —Unverified | 0 | 0 |
| On the Lack of Robustness of Binary Function Similarity Systems | Dec 5, 2024 | Malware AnalysisVulnerability Detection | —Unverified | 0 | 0 |
| Ontology-driven Knowledge Graph for Android Malware | Sep 3, 2021 | ArticlesMalware Analysis | —Unverified | 0 | 0 |
| PageRank in Malware Categorization | Aug 2, 2016 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 | 0 |
| Recent Advances in Malware Detection: Graph Learning and Explainability | Feb 14, 2025 | Feature EngineeringGraph Embedding | —Unverified | 0 | 0 |
| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 | 0 |