vusec / minesweeperLinks
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- the repo for cmtracker☆21Updated 7 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆786Updated this week
- ☆30Updated 4 years ago
- ☆22Updated 5 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- AVClass malware labeling tool☆481Updated last year
- IoT Security Reading List☆62Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆12Updated 4 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 3 years ago
- ☆197Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆53Updated 3 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 7 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Updated 2 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆188Updated last month
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆91Updated 2 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆773Updated 7 years ago
- Codes for WF attacks, defenses☆84Updated 2 years ago
- A practical attack framework for precise enclave execution control☆465Updated last month
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- ☆34Updated 7 years ago
- Material from the DARPA Transparent Computing Program☆222Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- Protocol Learning and Stateful Fuzzing☆353Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- JavaScript Transformation Techniques Detection☆11Updated 4 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆135Updated 3 years ago