Eyasics / reconLinks
Personal Information Exfiltration Detection Using Machine Learning
☆29Updated 7 years ago
Alternatives and similar repositories for recon
Users that are interested in recon are comparing it to the libraries listed below
Sorting:
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆71Updated 4 years ago
- Structural Analysis and Detection of Android Malware☆78Updated last year
- A library for adversarial classifier evasion☆43Updated 10 years ago
- SmartThings Analysis Tools☆25Updated 9 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- DroidSafe Android Static Analysis Source Repository☆96Updated 8 years ago
- The Static Android Analysis Framework.☆40Updated 9 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆59Updated 7 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- Symbolic/concolic execution of Android apps☆56Updated 9 years ago
- ☆87Updated 9 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- SuSi - our tool to automatically discover sources and sinks in the Android framework☆148Updated 8 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Updated 7 years ago
- Android Malware Detection Framework☆81Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆51Updated 5 years ago
- Auditing behaviour of Android Apps☆38Updated 8 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- This project seeks to apply machine learning algorithms to Android malware classification.☆103Updated 6 years ago
- Research papers and tools on Android☆128Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆64Updated last year
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆66Updated 7 years ago
- Dynamic malware analysis for the Android platform☆40Updated 10 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Updated 2 years ago
- automatic data race analysis for Linux device drivers☆12Updated 8 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 6 years ago
- ☆18Updated 7 years ago
- Software vulnerabilities data set☆23Updated 5 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago