vusec / minesweeperLinks
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- the repo for cmtracker☆21Updated 7 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- AVClass malware labeling tool☆481Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆777Updated this week
- ☆30Updated 3 years ago
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- IoT Security Reading List☆62Updated 5 years ago
- ☆22Updated 5 years ago
- ☆195Updated last year
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- A practical attack framework for precise enclave execution control☆465Updated last week
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 7 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆90Updated 2 years ago
- Protocol Learning and Stateful Fuzzing☆353Updated 3 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆71Updated last year
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆88Updated last year
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Updated 2 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆189Updated last week
- LAVA: Large-scale Automated Vulnerability Addition☆407Updated this week
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Updated 8 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆202Updated last month
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆325Updated 7 years ago