RUB-SysSec / we-value-your-privacy
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for we-value-your-privacy
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆40Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- A library for adversarial classifier evasion☆40Updated 9 years ago
- Modular static malicious JavaScript detection system☆65Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆11Updated 3 years ago
- ☆55Updated 5 years ago
- PDF Malware Parser☆20Updated 8 years ago
- ☆9Updated 4 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆73Updated last year
- ☆23Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated last year
- ☆91Updated last month
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆27Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆26Updated 2 years ago
- Pytorch implementation of MalConv☆70Updated 2 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 5 months ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- ☆75Updated 4 years ago
- ☆23Updated 2 months ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- ☆15Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆30Updated 8 months ago
- ☆24Updated 5 years ago