vusec / minesweeper
Tools used for MineSweeper project
☆31Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for minesweeper
- the repo for cmtracker☆22Updated 6 years ago
- The data and data used in OutGuard☆7Updated 5 years ago
- ☆9Updated 4 years ago
- ☆22Updated 4 years ago
- ☆27Updated 2 years ago
- Modular static malicious JavaScript detection system☆65Updated 3 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆73Updated 4 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 5 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆83Updated 5 months ago
- IoT Security Reading List☆62Updated 4 years ago
- ☆74Updated 2 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆20Updated 8 years ago
- A crawler that uses OpenWPM.☆12Updated 2 years ago
- AVClass malware labeling tool☆464Updated last month
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆47Updated 2 years ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆290Updated 4 months ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- Material from the DARPA Transparent Computing Program☆180Updated 4 years ago
- Collects all WebAssembly modules from a given website☆26Updated 4 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- ☆18Updated 10 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆35Updated 4 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆666Updated 2 weeks ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- ☆44Updated 2 years ago