ChrisChV / UNSA-CS
All programs and code when I studied Computer Science on UNSA
☆9Updated 2 years ago
Alternatives and similar repositories for UNSA-CS:
Users that are interested in UNSA-CS are comparing it to the libraries listed below
- Python Flask Web application with mysql database☆10Updated 4 years ago
- CS155: Network and Web Security Projects☆13Updated 2 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated 5 months ago
- 哈工大《信息隐藏技术》作业☆9Updated 7 years ago
- A collection of security papers on top-tier publications☆37Updated 2 months ago
- ☆18Updated 5 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- This is the official repository for VulHawk.☆67Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆28Updated 4 months ago
- Seminar 2022☆22Updated this week
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆31Updated 3 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 10 months ago
- ☆20Updated 4 months ago
- ☆26Updated last year
- A malware family classification model based on CNN☆23Updated 2 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆13Updated 3 months ago
- ☆29Updated 6 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆17Updated 3 years ago
- ☆11Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆19Updated last year
- ☆12Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆20Updated 2 years ago
- ☆16Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- Data for LLM4Vuln☆11Updated 11 months ago