jun521ju / IEEE_SP_2022_WtaGraphLinks
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆16Updated 3 years ago
Alternatives and similar repositories for IEEE_SP_2022_WtaGraph
Users that are interested in IEEE_SP_2022_WtaGraph are comparing it to the libraries listed below
Sorting:
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- A collection of security papers on top-tier publications☆43Updated 3 weeks ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆48Updated 2 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- ☆29Updated 9 months ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆31Updated 3 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆22Updated 2 years ago
- ☆29Updated last month
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated last month
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 6 months ago
- Android third-party library Detection☆16Updated 5 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆26Updated last year
- ☆28Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Updated 6 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆68Updated 6 months ago