DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
☆30Jul 4, 2024Updated last year
Alternatives and similar repositories for DVa
Users that are interested in DVa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android Dynamic Library Helper☆17Jul 27, 2014Updated 11 years ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 4 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆59Jun 20, 2018Updated 7 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Getting Started with the Core Slicing Prototype☆13Jun 2, 2023Updated 2 years ago
- ☆16Nov 9, 2022Updated 3 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Statistically Acceptable GAussian☆14Jul 6, 2023Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- Slides of mine.☆11Apr 19, 2024Updated 2 years ago
- ☆11Dec 4, 2023Updated 2 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Oct 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- KAIST Educational Virtualization☆16Mar 6, 2026Updated 2 months ago
- IP codecs written in Java☆14Nov 13, 2025Updated 6 months ago
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 6 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated 2 years ago
- ☆17Apr 25, 2020Updated 6 years ago
- Classification anomaly detection in IOT with Machine Learning☆15Mar 30, 2020Updated 6 years ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆43Jan 26, 2024Updated 2 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆45Jan 14, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- ☆22Nov 12, 2022Updated 3 years ago
- PoC for CVE-2024-38399☆25Sep 25, 2025Updated 7 months ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…