RUB-SysSec / we-value-your-privacy
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 4 years ago
Alternatives and similar repositories for we-value-your-privacy:
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
- A library for adversarial classifier evasion☆40Updated 10 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- PDF Malware Parser☆20Updated 8 years ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆41Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- ☆10Updated 4 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆29Updated 3 years ago
- ☆10Updated 4 years ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆11Updated 5 years ago
- ☆44Updated 2 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 8 months ago
- ☆23Updated last year
- ☆24Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆13Updated 3 years ago
- ☆16Updated 6 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆9Updated 7 years ago
- Human-In-The-Loop Automatic Program Repair☆19Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆17Updated last year
- Personal Information Exfiltration Detection Using Machine Learning☆28Updated 6 years ago
- Modular static malicious JavaScript detection system☆68Updated 4 years ago
- ☆55Updated 5 years ago
- Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using G…☆16Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆13Updated 2 years ago