jun521ju / IEEE_SP_2022_WtaGraphLinks
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆17Updated 4 years ago
Alternatives and similar repositories for IEEE_SP_2022_WtaGraph
Users that are interested in IEEE_SP_2022_WtaGraph are comparing it to the libraries listed below
Sorting:
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- ☆34Updated last year
- Additional code and data for the automated malware generation paper☆13Updated last year
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆32Updated 2 months ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- A collection of security papers on top-tier publications☆55Updated last month
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆65Updated 7 months ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆23Updated last year
- Project FlowCog (2017)☆27Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Updated 6 years ago
- Collection of AI and Security Papers☆28Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆25Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago