Eyasics / recon
Personal Information Exfiltration Detection Using Machine Learning
☆28Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for recon
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆69Updated 4 years ago
- A library for adversarial classifier evasion☆40Updated 9 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆45Updated 5 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 5 months ago
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- ☆18Updated 6 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- SmartThings Analysis Tools☆25Updated 8 years ago
- ☆9Updated 4 years ago
- Automatic Identification of Cryptographic Primitives in Software☆30Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- A framework for streamlining the capture of PANDA execution traces.☆55Updated 4 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆106Updated 2 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- DroidSafe Android Static Analysis Source Repository☆94Updated 7 years ago
- Dynamic malware analysis for the Android platform☆39Updated 10 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Updated 6 years ago
- The Static Android Analysis Framework.☆36Updated 8 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 5 months ago
- Programmer De-anonymization from Binary Executables☆86Updated 6 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆51Updated 4 years ago
- ☆9Updated 4 years ago
- Control Flow Graph Scanning for Android☆59Updated 9 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- ☆84Updated 8 years ago