RUB-SysSec / we-value-your-privacyLinks
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 4 years ago
Alternatives and similar repositories for we-value-your-privacy
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
Sorting:
- A library for adversarial classifier evasion☆43Updated 10 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 5 years ago
- ☆24Updated 2 years ago
- ☆44Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last month
- PDF Malware Parser☆20Updated 9 years ago
- ☆25Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆69Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- ☆55Updated 5 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆78Updated 2 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆32Updated 3 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆42Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 5 years ago
- Code used to run the platform for the LLM CTF colocated with SaTML 2024☆26Updated last year
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- ☆15Updated 3 years ago
- ☆146Updated 8 months ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- Structural Analysis and Detection of Android Malware☆78Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆23Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- ☆98Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago