RUB-SysSec / we-value-your-privacyLinks
Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆14Updated 4 years ago
Alternatives and similar repositories for we-value-your-privacy
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
Sorting:
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 5 years ago
- ☆11Updated 7 years ago
- ☆10Updated 4 years ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- pytorch version of the SAFE neural network☆55Updated 3 years ago
- PDF Malware Parser☆20Updated 9 years ago
- ☆15Updated 3 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- ☆79Updated 5 years ago
- Pytorch implementation of MalConv☆71Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- ☆55Updated 5 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆32Updated 3 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆18Updated last year
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- ☆15Updated 11 months ago
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆15Updated 3 years ago
- ☆11Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Structural Analysis and Detection of Android Malware☆78Updated last year