vusec / minesweeperLinks
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- the repo for cmtracker☆21Updated 7 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated last week
- ☆22Updated 5 years ago
- ☆30Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- AVClass malware labeling tool☆482Updated last year
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- ☆197Updated last year
- IoT Security Reading List☆62Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆408Updated this week
- A practical attack framework for precise enclave execution control☆469Updated 2 weeks ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- Source code for my books☆171Updated 2 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- neural network assisted fuzzer☆412Updated 5 years ago
- Raspbian with OP-TEE support.☆30Updated 6 years ago
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Updated 4 years ago
- ☆78Updated 3 years ago
- ☆35Updated last month
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆774Updated 8 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Material from the DARPA Transparent Computing Program☆224Updated 5 years ago
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Updated 4 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 8 years ago
- ☆34Updated 7 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 6 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Updated 2 months ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆334Updated 2 weeks ago