vusec / minesweeperLinks
Tools used for MineSweeper project
☆32Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- The data and data used in OutGuard☆8Updated 5 years ago
- the repo for cmtracker☆22Updated 6 years ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- IoT Security Reading List☆63Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated last year
- AVClass malware labeling tool☆476Updated 8 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆177Updated last year
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- ☆22Updated 5 years ago
- ☆58Updated 3 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆186Updated 10 months ago
- An unofficial implementation of asm2vec as a standalone python package☆165Updated 4 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆85Updated 2 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- ☆287Updated 10 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆63Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆194Updated 5 years ago
- ☆65Updated 8 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- Practical Data-Only Attack Generation☆40Updated last year
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆14Updated 3 years ago