gchers / fbleauLinks
A tool for estimating a system's information leakage via Machine Learning
☆10Updated last year
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆778Updated last week
- ☆26Updated last year
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- ☆32Updated 2 years ago
- ☆55Updated 6 years ago
- Material (mostly slides) for a graduate course on (formal) software analysis.☆32Updated 6 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆205Updated last month
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 4 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Updated 2 years ago
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- ☆21Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆16Updated 11 months ago
- The released code of ReluVal in USENIX Security 2018☆60Updated 5 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- ETH Robustness Analyzer for Deep Neural Networks☆344Updated 2 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Main source code repository of the Tamarin prover for security protocol verification.☆486Updated last week
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆128Updated 7 months ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆350Updated 5 years ago
- ☆38Updated 3 years ago
- ☆28Updated 2 years ago
- ☆22Updated last year
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago