user163 / image-encryption
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption:
Users that are interested in image-encryption are comparing it to the libraries listed below
- ☆21Updated 4 years ago
- ☆30Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- ☆34Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆60Updated 7 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆29Updated 11 months ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Partitioned Unit Memory Management☆14Updated 2 years ago
- ☆31Updated 4 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 5 months ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆98Updated 2 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆78Updated 8 months ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆12Updated 2 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- ☆24Updated last year
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆14Updated last year
- Malware Classification using Machine learning☆71Updated 4 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆136Updated last month
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆74Updated 5 years ago
- malicious PowerShell script detection model☆38Updated 3 years ago
- Attacks against QUIC (CVE-2022-30591)☆22Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated last month
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆43Updated 2 years ago
- This project is Malware detection API using ML and CNN techniques☆23Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆50Updated 9 months ago
- Machine Learning in Cybersecurity☆80Updated 6 months ago
- Tag Generation and Text Generation Inference for Network Packets using Transformers☆11Updated last year
- Raspbian with OP-TEE support.☆26Updated 6 years ago
- ☆43Updated last year
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Updated 8 years ago