Eyasics / recon
Personal Information Exfiltration Detection Using Machine Learning
☆28Updated 6 years ago
Alternatives and similar repositories for recon:
Users that are interested in recon are comparing it to the libraries listed below
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆69Updated 4 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 8 months ago
- SmartThings Analysis Tools☆25Updated 8 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 8 months ago
- A library for adversarial classifier evasion☆40Updated 10 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Programmer De-anonymization from Binary Executables☆86Updated 6 years ago
- The Static Android Analysis Framework.☆39Updated 9 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Symbolic/concolic execution of Android apps☆56Updated 8 years ago
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- ☆18Updated 6 years ago
- Scripts for collecting metrics of the attack surface☆14Updated 3 years ago
- DroidSafe Android Static Analysis Source Repository☆94Updated 7 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- ☆85Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Dynamic malware analysis for the Android platform☆40Updated 10 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Research papers and tools on Android☆128Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 8 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 6 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 9 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Static Analysis Framework for Android Hybrid Applications☆24Updated 4 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆68Updated 5 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago