Bramas / hotcrp-docker-compose
An easy docker-compose deployement of hotcrp
☆18Updated 2 years ago
Alternatives and similar repositories for hotcrp-docker-compose:
Users that are interested in hotcrp-docker-compose are comparing it to the libraries listed below
- HotCRP conference review software☆350Updated this week
- configuration evolution dataset☆17Updated 4 years ago
- This is the artifact for paper “Are Machine Learning Cloud APIs Used Correctly? (#421)” in ICSE2021☆15Updated 4 years ago
- DiffSearch is a search engine for code changes. The input is a query that describes a code change and the output is a list of matching co…☆19Updated last year
- The open-source component of Prime+Scope, published at CCS 2021☆30Updated last year
- 64-bit port of the RIPE benchmark (buffer overflow attacks). RIPE was originally developed by John Wilander and Nick Nikiforakis and pres…☆20Updated 3 years ago
- ☆74Updated 2 years ago
- Artifact for ESEC/FSE'23 paper "NeuRI: Diversifying DNN Generation via Inductive Rule Inference"☆30Updated last year
- This is the implementation repository of our ICSE'22 paper: Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.☆30Updated 2 years ago
- ☆19Updated 11 months ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆12Updated last year
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆77Updated 2 years ago
- Major CS conference publication stats (including accepted and submitted) by year.☆119Updated 3 months ago
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆26Updated 4 years ago
- This repository contains the dataset of our ISSTA 2018 paper: An Empirical Study on TensorFlow Program Bugs.☆30Updated 4 years ago
- Open source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆22Updated this week
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆19Updated 4 years ago
- Website for Research Artifacts from the Security Community☆18Updated 2 weeks ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆37Updated 5 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆59Updated 4 years ago
- A learning-guided approach for executing arbitrary Python code snippets☆15Updated last year
- A Reading List of System Configuration Management☆56Updated 7 months ago
- Reload+Refresh PoC☆14Updated 5 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- ☆30Updated 3 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated 2 weeks ago
- ACM consolidated LaTeX styles☆66Updated 5 years ago
- ☆19Updated 2 years ago
- Material (mostly slides) for a graduate course on (formal) software analysis.☆32Updated 5 years ago
- LLTFI is a tool, which is an extension of LLFI, allowing users to run fault injection experiments on C/C++, TensorFlow and PyTorch applic…☆37Updated 5 months ago