rakshithShetty / A4NT-author-masking
Repository for author masking
☆12Updated 6 years ago
Alternatives and similar repositories for A4NT-author-masking:
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
- implementation of ICML 2018 paper, Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples☆77Updated 5 years ago
- PDF Malware Parser☆20Updated 8 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆78Updated last year
- ☆79Updated 5 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Library and experiments for attacking machine learning in discrete domains☆45Updated 2 years ago
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆14Updated 6 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- Generate adversarial text via gradient methods☆31Updated 6 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- ☆55Updated 5 years ago
- A library for adversarial classifier evasion☆41Updated 10 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Updated 8 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆21Updated 2 months ago
- ☆12Updated 8 years ago
- MARNNs Can Learn Generalized Dyck Languages☆10Updated 5 years ago
- Personal Information Exfiltration Detection Using Machine Learning☆28Updated 6 years ago
- ☆16Updated last year
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆16Updated 6 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated 8 months ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Property Inference from Deep Neural Networks☆20Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Updated 5 years ago
- Adversarial Malware Generator Using GANs☆53Updated 9 months ago