spring-epfl / WebGraph
☆14Updated 6 months ago
Alternatives and similar repositories for WebGraph:
Users that are interested in WebGraph are comparing it to the libraries listed below
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆62Updated 2 weeks ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆41Updated 5 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆29Updated 3 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- ☆34Updated last week
- ☆95Updated 3 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 11 months ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- Modular static malicious JavaScript detection system☆67Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆43Updated 2 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆47Updated last week
- Programs generated by ChatGPT☆26Updated last year
- RICC: Robust Collective Classification of Sybil Accounts☆11Updated last year
- ☆32Updated 7 months ago
- GitHub Cloner & Compiler☆60Updated 3 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- Open-source code for RFCNLP paper.☆54Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆58Updated last year
- A crawler that uses OpenWPM.☆12Updated 3 years ago
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆57Updated 10 months ago
- Debugging library to quickly get the minimal crashing test case☆35Updated 6 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- ☆75Updated 2 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆44Updated 11 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆72Updated 7 months ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆12Updated last year
- ☆62Updated 6 months ago
- ☆19Updated last year
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆14Updated 2 years ago
- ☆34Updated 4 months ago