rakshithShetty / A4NT-author-maskingLinks
Repository for author masking
☆12Updated 6 years ago
Alternatives and similar repositories for A4NT-author-masking
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
Sorting:
- PDF Malware Parser☆20Updated 9 years ago
- ☆79Updated 5 years ago
- Game-Theoretic Adversarial Machine Learning Library☆58Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Neural Variable Renaming for Decompiled Binaries☆44Updated 5 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Pytorch implementation of MalConv☆71Updated 3 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Library and experiments for attacking machine learning in discrete domains☆45Updated 2 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 7 years ago
- Demonstration of the path-extraction process shown in the paper "A General Path-Based Representation for Predicting Program Properties"☆24Updated 3 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Awesome list for asm2vec☆18Updated 4 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- ☆25Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Updated 8 years ago
- Programmer De-anonymization via Code Stylometry☆78Updated 7 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆220Updated 11 months ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 8 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- ☆55Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 4 years ago