RUB-SysSec / we-value-your-privacyLinks
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 5 years ago
Alternatives and similar repositories for we-value-your-privacy
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
Sorting:
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 6 years ago
- ☆22Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Updated 6 years ago
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- ☆10Updated 5 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 7 years ago
- ☆55Updated 5 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Seminar 2016☆25Updated last year
- ☆10Updated 5 years ago
- ☆29Updated 3 years ago
- ☆207Updated last year
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆70Updated 4 years ago
- the repo for cmtracker☆21Updated 7 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆767Updated last week
- This repository holds the code for PolicyLint and PoliCheck, which identifies internal contradictions within privacy policies and analyze…☆60Updated 3 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆58Updated 4 years ago
- ☆22Updated 2 years ago
- Malware detection using the Drebin dataset☆21Updated 2 years ago
- Personal Information Exfiltration Detection Using Machine Learning☆29Updated 7 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- ☆11Updated last year