jun521ju / IEEE_SP_2022_WtaGraph
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆16Updated 3 years ago
Alternatives and similar repositories for IEEE_SP_2022_WtaGraph:
Users that are interested in IEEE_SP_2022_WtaGraph are comparing it to the libraries listed below
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆27Updated 4 months ago
- Additional code and data for the automated malware generation paper☆12Updated 8 months ago
- A collection of security papers on top-tier publications☆37Updated last month
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆44Updated 2 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆30Updated 2 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- Modular static malicious JavaScript detection system☆66Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆22Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- ☆25Updated 11 months ago
- ☆28Updated last year
- GitHub Cloner & Compiler☆60Updated 3 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated 9 months ago
- Codee☆17Updated 4 years ago
- ☆24Updated 11 months ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆28Updated last month
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Academic Papers about LLM Application on Security☆115Updated 7 months ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆15Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆53Updated 5 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- ☆12Updated 4 years ago
- ☆16Updated 3 years ago
- ☆94Updated 2 months ago