tudelft-cda-lab / FlexFringe
The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/2203.16331
☆19Updated last week
Alternatives and similar repositories for FlexFringe:
Users that are interested in FlexFringe are comparing it to the libraries listed below
- ☆12Updated 4 years ago
- Protocol state machine learner and fuzzer for DTLS servers and clients☆37Updated last week
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 4 years ago
- ☆30Updated 4 years ago
- OpenAI Gym environment for binary fuzzing based on afl☆23Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 2 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last week
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆18Updated 3 weeks ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- Open-source code for RFCNLP paper.☆57Updated 2 years ago
- ☆12Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- ☆9Updated 7 years ago
- ☆28Updated 3 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆19Updated 3 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 9 years ago
- A Quick Research of Active Automata Learning☆28Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆17Updated last year
- ☆14Updated 4 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- ☆8Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆54Updated 2 years ago
- Public BanditFuzz Repo☆12Updated 4 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year