jun521ju / IEEE_SP_2022_WtaGraphLinks
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆17Updated 4 years ago
Alternatives and similar repositories for IEEE_SP_2022_WtaGraph
Users that are interested in IEEE_SP_2022_WtaGraph are comparing it to the libraries listed below
Sorting:
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- ☆34Updated last year
- Additional code and data for the automated malware generation paper☆13Updated last year
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- A collection of security papers on top-tier publications☆59Updated this week
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- 模糊测试种子库 comprehensive croups for fuzzing seeds with carfefully selected(rate=coverage/filesize)☆23Updated 4 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps