vusec / minesweeperLinks
Tools used for MineSweeper project
☆31Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- the repo for cmtracker☆21Updated 7 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆792Updated this week
- ☆30Updated 4 years ago
- ☆22Updated 5 years ago
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- AVClass malware labeling tool☆482Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Updated 7 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- ☆197Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 7 years ago
- Codes for WF attacks, defenses☆86Updated 2 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Updated 4 years ago
- A practical attack framework for precise enclave execution control☆466Updated 2 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆15Updated 4 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Updated 5 years ago
- ☆15Updated 4 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 9 months ago
- Source code for my books☆170Updated 2 years ago
- ☆78Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- ☆102Updated 5 years ago
- Material from the DARPA Transparent Computing Program☆221Updated 5 years ago