vusec / minesweeperLinks
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- The data and data used in OutGuard☆7Updated 5 years ago
- the repo for cmtracker☆21Updated 6 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆735Updated last week
- ☆29Updated 3 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- AVClass malware labeling tool☆476Updated 9 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆65Updated last year
- ☆22Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- Material from the DARPA Transparent Computing Program☆199Updated 5 years ago
- IoT Security Reading List☆63Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- ☆31Updated 4 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆183Updated this week
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- ☆14Updated 4 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆67Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 6 years ago
- Codes for WF attacks, defenses☆83Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆103Updated 3 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆93Updated 2 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆51Updated 3 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆165Updated last month
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆123Updated 2 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 7 years ago
- Raspbian with OP-TEE support.☆27Updated 6 years ago