cslfiu / IoTCryptojacking
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Alternatives and similar repositories for IoTCryptojacking:
Users that are interested in IoTCryptojacking are comparing it to the libraries listed below
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated last year
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- ☆19Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆67Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆23Updated last month
- ☆19Updated 4 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆69Updated 8 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆158Updated 10 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- ☆31Updated 4 years ago
- Open-source code for RFCNLP paper.☆56Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆35Updated 8 months ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆53Updated 9 months ago
- ☆24Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆34Updated 2 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- ☆23Updated 9 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆19Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆50Updated 10 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14Updated 3 years ago
- source code for USENIX Security paper xNIDS☆40Updated 7 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆135Updated 2 years ago
- A curated list of malware-related papers.☆24Updated last year