mixianghang / IFTTT_measurementLinks
Here, we open source our measurement dataset and source code on IFTTT
☆11Updated 6 years ago
Alternatives and similar repositories for IFTTT_measurement
Users that are interested in IFTTT_measurement are comparing it to the libraries listed below
Sorting:
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆25Updated 6 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆10Updated 4 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 8 months ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Resillent Control-Flow Attestation☆12Updated 3 years ago
- A security-oriented static binary analysis tool for comparing the quantity and quality of code reuse gadget sets in program variants.☆17Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆30Updated 6 years ago
- ☆44Updated 3 years ago
- ☆14Updated 4 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- GraphChi's C++ version. Big Data - small machine.☆18Updated 4 years ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 3 years ago
- ☆40Updated 2 years ago
- ☆17Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆21Updated 8 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 5 years ago
- ☆9Updated 7 years ago
- IoT Security Reading List☆63Updated 5 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago