Eyasics / recon
Personal Information Exfiltration Detection Using Machine Learning
☆28Updated 6 years ago
Alternatives and similar repositories for recon:
Users that are interested in recon are comparing it to the libraries listed below
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆69Updated 4 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 10 months ago
- SmartThings Analysis Tools☆25Updated 8 years ago
- ☆10Updated 4 years ago
- A library for adversarial classifier evasion☆41Updated 10 years ago
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- The Static Android Analysis Framework.☆39Updated 9 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 10 months ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- DroidSafe Android Static Analysis Source Repository☆95Updated 8 years ago
- Version of the tor-browser-crawler that we used with Onionpop.☆8Updated 7 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆58Updated 6 years ago
- IC3: Inter-Component Communication Analysis in Android☆38Updated 5 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 9 years ago
- ☆86Updated 9 years ago
- Inter-component communication Taint Analysis for Android☆92Updated 9 years ago
- A cryptographic method that defends against side-channel attacks☆24Updated 8 years ago
- SuSi - our tool to automatically discover sources and sinks in the Android framework☆147Updated 8 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Dynamic malware analysis for the Android platform☆40Updated 10 years ago
- Symbolic/concolic execution of Android apps☆56Updated 9 years ago
- ☆44Updated 4 years ago
- ☆18Updated 7 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆68Updated 5 years ago
- Identifying and Explaining Similarities in Android Apps☆26Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago