ChrisChV / UNSA-CS
All programs and code when I studied Computer Science on UNSA
☆10Updated 2 years ago
Alternatives and similar repositories for UNSA-CS:
Users that are interested in UNSA-CS are comparing it to the libraries listed below
- 编译原理课程作业-- 计算器, 内含表达式的计算(中缀转后缀)☆8Updated 5 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 3 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆10Updated 10 months ago
- ☆12Updated 4 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆14Updated 5 months ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆60Updated 7 months ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Updated 5 years ago
- ☆12Updated 3 years ago
- 武大信息隐藏实验☆18Updated last year
- Extracts and visualizes control flow graphs for assembly code.☆13Updated 6 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- ☆18Updated 5 years ago
- matlab实现的信息隐藏☆8Updated 4 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆28Updated 4 years ago
- ☆17Updated 5 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆25Updated last year
- ☆12Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- CS155: Network and Web Security Projects☆12Updated 2 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆30Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆28Updated 3 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆39Updated last year
- ☆19Updated 3 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆13Updated 11 months ago
- ☆25Updated 5 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Updated last year
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆17Updated 3 years ago