https://github.com/shreyansh26/opcodes-for-malware-detection
Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar
https://github.com/shreyansh26/opcodes-for-malware-detection
elf hacktoberfest malware malware-detection opcodes
Last synced: 3 months ago
JSON representation
Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar
- Host: GitHub
- URL: https://github.com/shreyansh26/opcodes-for-malware-detection
- Owner: shreyansh26
- License: mit
- Created: 2018-12-21T07:01:29.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2020-10-17T19:17:24.000Z (almost 5 years ago)
- Last Synced: 2025-03-24T18:52:34.454Z (7 months ago)
- Topics: elf, hacktoberfest, malware, malware-detection, opcodes
- Language: Jupyter Notebook
- Homepage:
- Size: 6.44 MB
- Stars: 11
- Watchers: 2
- Forks: 2
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Opcodes for Malware Detection
## Requirements
1. Python 2.7
2. Java 8.0+## To run the system
1. Put all the ELF files to analyse in the `elf` folder.
2. Run `python run_system.py`## Description
* The dataset on which the models were trained is **results.csv**.
* The saved models are in **models/**.
* The code for model evaluation on the test set is in **system/**.