Eyasics / reconLinks
Personal Information Exfiltration Detection Using Machine Learning
☆29Updated 7 years ago
Alternatives and similar repositories for recon
Users that are interested in recon are comparing it to the libraries listed below
Sorting:
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Updated 5 years ago
- SmartThings Analysis Tools☆25Updated 9 years ago
- DroidSafe Android Static Analysis Source Repository☆97Updated 8 years ago
- Structural Analysis and Detection of Android Malware☆77Updated last year
- ☆85Updated 9 years ago
- Symbolic/concolic execution of Android apps☆57Updated 9 years ago
- SuSi - our tool to automatically discover sources and sinks in the Android framework☆149Updated 8 years ago
- Research papers and tools on Android☆128Updated 4 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆59Updated 7 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Updated 6 years ago
- This is the code for the Pluto framework to assess data exposure by an Android app to an advertising library. The framework was presented…☆13Updated 7 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago
- This project seeks to apply machine learning algorithms to Android malware classification.☆104Updated 7 years ago
- A micro-benchmark suite to assess the stability of taint-analysis tools for Android☆288Updated 5 months ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆52Updated 5 years ago
- axplorer - Android Permission Mappings☆112Updated 5 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 10 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆67Updated 6 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Updated 7 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Updated 7 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- ☆44Updated 5 years ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆43Updated 6 years ago
- The Static Android Analysis Framework.☆40Updated 10 years ago
- Code for Deep Android Malware Detection paper☆179Updated 8 years ago
- Android Malware Detection Framework☆81Updated 8 years ago