jun521ju / IEEE_SP_2022_WtaGraphLinks
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆17Updated 4 years ago
Alternatives and similar repositories for IEEE_SP_2022_WtaGraph
Users that are interested in IEEE_SP_2022_WtaGraph are comparing it to the libraries listed below
Sorting:
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- ☆34Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 3 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- ☆102Updated 5 years ago
- A collection of security papers on top-tier publications☆59Updated this week
- The scalable bug search for binaries☆70Updated 9 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- 模糊测试种子库 comprehensive croups for fuzzing seeds with carfefully selected(rate=coverage/filesize)☆23Updated 4 years ago
- ☆10Updated 5 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆161Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 2 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 9 months ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated last year