Who is Creating Malware Repositories on GitHub and Why?

NA Tania, MR Masud, MOF Rokon, Q Zhang… - … Proceedings of the …, 2024 - dl.acm.org
Recent studies have found thousands of malware source code repositories on GitHub. For
the first time, we propose to understand the origins and motivations behind the creation of …

{SourceFinder}: Finding malware {Source-Code} from publicly available repositories in {GitHub}

MOF Rokon, R Islam, A Darki, EE Papalexakis… - … on Research in Attacks …, 2020 - usenix.org
Where can we find malware source code? This question is motivated by a real need: there is
a dearth of malware source code, which impedes various types of security research. Our …

Unveiling A Hidden Risk: Exposing Educational but Malicious Repositories in GitHub

MR Masud, M Faloutsos - arXiv preprint arXiv:2403.04419, 2024 - arxiv.org
Are malicious repositories hiding under the educational label in GitHub? Recent studies
have identified collections of GitHub repositories hosting malware source code with notable …

[PDF][PDF] Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned.

W La Cholter, M Elder, A Stalick - ICISSP, 2021 - scitepress.org
Does malware lurking in GitHub pose a threat? GitHub is the most popular open source
software website, having 188 million repositories. GitHub hosts malware-related projects for …

[图书][B] A Systematic Approach for Finding and Profiling Malware Source Code in Public Archives

OF Rokon - 2022 - search.proquest.com
How can we find malware source code and establish the similarity, influence, and phylogeny
of these malware? This question is motivated by a real need: there is a dearth of malware …

Anomalicious: Automated detection of anomalous and potentially malicious commits on github

D Gonzalez, T Zimmermann… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Security is critical to the adoption of open source software (OSS), yet few automated
solutions currently exist to help detect and prevent malicious contributions from infecting …

Hackerscope: The dynamics of a massive hacker online ecosystem

R Islam, MOF Rokon, A Darki, M Faloutsos - Social Network Analysis and …, 2021 - Springer
One would have thought that hackers would be striving to hide from public view, but we find
that this is not the case: they have a public online footprint. Apart from online security forums …

Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

[PDF][PDF] What the fork? finding and analyzing malware in github forks

A Cao, B Dolan-Gavitt - Proc. of NDSS, 2022 - ndss-symposium.org
On GitHub, open-source developers use the fork feature to create server-side clones and
implement code changes separately before creating pull requests. However, such fork …

Bad snakes: Understanding and improving python package index malware scanning

DL Vu, Z Newman, JS Meyers - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Open-source, community-driven package repositories see thousands of malware packages
each year, but do not currently run automated malware detection systems. In this work, we …