seclab-ucr / ThemisLinks
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆23Updated 2 years ago
Alternatives and similar repositories for Themis
Users that are interested in Themis are comparing it to the libraries listed below
Sorting:
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆18Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated 11 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- ☆31Updated 10 months ago
- Website for Research Artifacts from the Security Community☆18Updated last week
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- ☆35Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆54Updated 3 months ago
- Open-source code for RFCNLP paper.☆59Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- ☆15Updated 4 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆45Updated 3 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 8 months ago
- A collection of security papers on top-tier publications☆48Updated 2 weeks ago
- ☆77Updated 3 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆21Updated last year
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- Works about detecting vulnerable using ML.☆85Updated 5 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Updated 10 months ago
- Codee☆17Updated 4 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated 11 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆84Updated 3 months ago
- ☆28Updated last year
- ☆50Updated 4 years ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆27Updated 2 years ago