teamnsrg / outguard
The data and data used in OutGuard
☆8Updated 5 years ago
Alternatives and similar repositories for outguard:
Users that are interested in outguard are comparing it to the libraries listed below
- Tools used for MineSweeper project☆31Updated 3 years ago
- ☆27Updated 3 years ago
- Modular static malicious JavaScript detection system☆67Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- the repo for cmtracker☆22Updated 6 years ago
- ☆10Updated 4 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆22Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆79Updated 5 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆81Updated last year
- ☆24Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 8 months ago
- Drebin - NDSS 2014 Re-implementation☆105Updated 7 years ago
- ☆74Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- ☆18Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆13Updated 3 years ago
- ☆22Updated 5 years ago
- ☆21Updated 4 years ago
- Malware detection using the Drebin dataset☆20Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆17Updated 3 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆39Updated 3 years ago
- User Guided API Misuse Detection☆27Updated 2 years ago
- ☆14Updated last year
- ☆29Updated last year
- ☆68Updated 3 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆35Updated 2 years ago