seclab-ucr / ThemisLinks
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆23Updated 2 years ago
Alternatives and similar repositories for Themis
Users that are interested in Themis are comparing it to the libraries listed below
Sorting:
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- ☆34Updated last year
- Additional code and data for the automated malware generation paper☆13Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆52Updated 7 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- ☆30Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆71Updated last year
- AI安全☆35Updated 4 years ago
- This is the official repository for VulHawk.☆74Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 4 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- Open-source code for RFCNLP paper.☆58Updated 3 years ago
- ☆55Updated 5 years ago
- A collection of security papers on top-tier publications☆58Updated 2 months ago
- The scalable bug search for binaries☆70Updated 8 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆33Updated 3 months ago
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆70Updated 7 months ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆171Updated 7 months ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- ☆31Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Updated last year
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆60Updated 6 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆55Updated last year