RUB-SysSec / we-value-your-privacy
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 4 years ago
Alternatives and similar repositories for we-value-your-privacy:
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- Code release for our WWW 2019 paper entitled "ShadowBlock: A Lightweight and Stealthy Adblocking Browser".☆19Updated 5 years ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆69Updated 4 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- A library for adversarial classifier evasion☆41Updated 10 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆30Updated 3 years ago
- Personal Information Exfiltration Detection Using Machine Learning☆28Updated 6 years ago
- ☆16Updated last year
- Browser Fingerprinting Attribute Selection Tool☆8Updated last year
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- ☆10Updated 4 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆17Updated last year
- Software vulnerabilities data set☆24Updated 5 years ago
- PDF Malware Parser☆20Updated 8 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- ☆10Updated 4 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using G…☆16Updated 3 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆32Updated 6 years ago
- ☆10Updated 5 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆22Updated last year
- Human-In-The-Loop Automatic Program Repair☆19Updated 5 years ago