Bramas / hotcrp-docker-compose
An easy docker-compose deployement of hotcrp
☆17Updated 2 years ago
Alternatives and similar repositories for hotcrp-docker-compose:
Users that are interested in hotcrp-docker-compose are comparing it to the libraries listed below
- HotCRP conference review software☆343Updated this week
- Major CS conference publication stats (including accepted and submitted) by year.☆117Updated last month
- Testing Configuration Changes in Context to Prevent Production Failures☆30Updated last year
- ☆28Updated last month
- Artifact for ESEC/FSE'23 paper "NeuRI: Diversifying DNN Generation via Inductive Rule Inference"☆31Updated last year
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆19Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆129Updated 3 months ago
- Cycle Accurate Symbolic Timing Analysis of Network Functions☆10Updated 3 years ago
- This repository contains the artifact for the SOSP'23 paper: Sishuai Gong, Dinglan Peng, Deniz Altınbüken, Pedro Fonseca, Petros Maniati…☆11Updated last year
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆59Updated 4 years ago
- Automatic detection of speculative information flows☆67Updated 3 years ago
- This is the implementation repository of our ICSE'22 paper: Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.☆30Updated 2 years ago
- Configuration dependency analysis for cloud software☆22Updated 3 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆12Updated last year
- A Reading List of System Configuration Management☆54Updated 5 months ago
- Microscope: Enabling Microarchitectural Replay Attacks☆18Updated 4 years ago
- ☆27Updated last year
- The artifact for SecSMT paper -- Usenix Security 2022☆26Updated 2 years ago
- configuration evolution dataset☆16Updated 3 years ago
- ☆18Updated 2 years ago
- Checks the PDFs submitted to a conference, e.g., for formatting violations and double anonymous violations☆61Updated 3 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 3 years ago
- ☆74Updated last year
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆26Updated 4 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆29Updated last year
- ☆31Updated last month
- ☆18Updated 9 months ago
- New Cache implementation using Gem5☆13Updated 10 years ago
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆74Updated 2 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆26Updated 6 years ago