vusec / minesweeper
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- The data and data used in OutGuard☆8Updated 5 years ago
- the repo for cmtracker☆22Updated 6 years ago
- ☆29Updated 3 years ago
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- ☆22Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 11 months ago
- IoT Security Reading List☆62Updated 5 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆83Updated 2 years ago
- AVClass malware labeling tool☆472Updated 6 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 11 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- ☆99Updated 4 years ago
- ☆76Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- ☆14Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- ☆57Updated 3 years ago
- ☆44Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆21Updated 6 months ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Updated 7 years ago
- ☆23Updated 3 years ago
- ☆49Updated 4 years ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- ☆65Updated 8 years ago
- Material from the DARPA Transparent Computing Program☆193Updated 5 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 6 months ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago