SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
☆16May 19, 2025Updated 9 months ago
Alternatives and similar repositories for ML_Extraction_Sok
Users that are interested in ML_Extraction_Sok are comparing it to the libraries listed below
Sorting:
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆21Nov 14, 2024Updated last year
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆15Jun 8, 2022Updated 3 years ago
- ☆62Dec 27, 2025Updated 2 months ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- ☆25Mar 26, 2025Updated 11 months ago
- ☆22Aug 23, 2022Updated 3 years ago
- ☆25Nov 8, 2023Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- ☆30May 16, 2022Updated 3 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- ViDeZZo source code.☆39Apr 15, 2025Updated 10 months ago
- ☆34Jun 5, 2023Updated 2 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆37Aug 17, 2023Updated 2 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- Detecting and analyzing deep learning usage on smartphone apps☆32Jan 22, 2024Updated 2 years ago
- ☆41Feb 26, 2023Updated 3 years ago
- ☆11Aug 21, 2017Updated 8 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- ☆10Mar 24, 2022Updated 3 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Unofficial reference for UAS-related APIs☆15Dec 15, 2023Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 9 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- llvm Call Graph分析☆10May 27, 2017Updated 8 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year