Eyasics / recon
Personal Information Exfiltration Detection Using Machine Learning
☆29Updated 6 years ago
Alternatives and similar repositories for recon
Users that are interested in recon are comparing it to the libraries listed below
Sorting:
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆69Updated 4 years ago
- Structural Analysis and Detection of Android Malware☆77Updated 10 months ago
- SmartThings Analysis Tools☆25Updated 9 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 10 months ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Updated 2 years ago
- DroidSafe Android Static Analysis Source Repository☆95Updated 8 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- ☆18Updated 7 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆66Updated 7 years ago
- ☆43Updated 4 years ago
- The Static Android Analysis Framework.☆39Updated 9 years ago
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- Automatic Feature Generation for Website Fingerprinting☆31Updated 8 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆58Updated 6 years ago
- This project seeks to apply machine learning algorithms to Android malware classification.☆103Updated 6 years ago
- A library for adversarial classifier evasion☆42Updated 10 years ago
- SuSi - our tool to automatically discover sources and sinks in the Android framework☆147Updated 8 years ago
- ☆86Updated 9 years ago
- Research papers and tools on Android☆127Updated 4 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 5 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- Identifying and Explaining Similarities in Android Apps☆27Updated 6 years ago
- Dynamic malware analysis for the Android platform☆40Updated 10 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- SDNMap☆8Updated 7 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago