surrealyz / growtreesLinks
Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf
☆18Updated 4 years ago
Alternatives and similar repositories for growtrees
Users that are interested in growtrees are comparing it to the libraries listed below
Sorting:
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- ☆43Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- ☆25Updated 6 years ago
- ☆10Updated 5 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago
- Research papers on ML for security☆35Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- Disassemblers with various trimming methodologies☆15Updated last year
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- ☆27Updated 4 months ago
- ☆41Updated 6 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- ☆17Updated 6 years ago
- Fuzz testing framework for binary programs using AI☆52Updated 2 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- ☆39Updated 4 years ago
- ☆24Updated 7 years ago
- ☆22Updated 2 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- ☆14Updated 8 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 7 years ago
- The scalable bug search for binaries☆70Updated 9 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆124Updated 4 years ago