jun521ju / IEEE_SP_2022_WtaGraph
Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks"
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for IEEE_SP_2022_WtaGraph
- A collection of security papers on top-tier publications☆36Updated this week
- ☆25Updated 2 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- ☆30Updated 4 months ago
- Additional code and data for the automated malware generation paper☆13Updated 6 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated this week
- A Knowledge Graph for Open Source Security Tools☆15Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆34Updated 2 years ago
- Android third-party library Detection☆16Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆27Updated 3 weeks ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- Academic Papers about LLM Application on Security☆109Updated 5 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆41Updated 2 years ago
- A curated list of malware-related papers.☆22Updated 8 months ago
- ☆15Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 2 years ago
- ☆14Updated 3 years ago
- Awesome materials for software supply chain security☆17Updated 4 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆22Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year