SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
☆16May 19, 2025Updated 10 months ago
Alternatives and similar repositories for ML_Extraction_Sok
Users that are interested in ML_Extraction_Sok are comparing it to the libraries listed below
Sorting:
- ☆11Aug 10, 2021Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 5 months ago
- Key share management in SGX secure enclaves.☆15Aug 13, 2024Updated last year
- ☆22Aug 23, 2022Updated 3 years ago
- Rust implementation of CRYSTALS post-quantum cryptography primitives: Kyber key-encapsulation mechanism and Dilitium digital signature al…☆15Aug 1, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆21Nov 14, 2024Updated last year
- Occlum's fork of Intel SGX SDK for Linux☆13Jul 31, 2024Updated last year
- Java library for parsing and manipulating graph representations of gate-level Verilog netlists☆15Jan 9, 2017Updated 9 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- Intel® Software Guard Extensions (Intel® SGX) Samples☆11Dec 2, 2016Updated 9 years ago
- This is a probabilistic SAT attack tool.☆13Jun 5, 2021Updated 4 years ago
- ☆16Sep 12, 2023Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆15Jul 19, 2022Updated 3 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- ☆10Feb 4, 2024Updated 2 years ago
- ☆63Dec 27, 2025Updated 2 months ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- A collection of papers and libraries for performing multi-agent optimization☆17Feb 7, 2026Updated last month
- The server part of the SafeKeeper project.☆18Jul 12, 2018Updated 7 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆16Jun 8, 2022Updated 3 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- A code confidentiality framework for Intel SGX☆19Jan 8, 2019Updated 7 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆22Feb 28, 2020Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- ☆13Jul 26, 2021Updated 4 years ago