gchers / fbleauLinks
A tool for estimating a system's information leakage via Machine Learning
☆10Updated last year
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated this week
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated last year
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- ☆55Updated 6 years ago
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆503Updated this week
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 4 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆211Updated 3 months ago
- ☆38Updated 3 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated 4 months ago
- HotCRP conference review software☆389Updated last week
- ☆27Updated 2 years ago
- ☆32Updated 2 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- ☆21Updated 2 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆354Updated 5 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 7 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 6 years ago
- ETH Robustness Analyzer for Deep Neural Networks☆343Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 4 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Updated this week
- ☆184Updated 4 years ago