ChrisChV / UNSA-CS
All programs and code when I studied Computer Science on UNSA
☆10Updated 2 years ago
Alternatives and similar repositories for UNSA-CS:
Users that are interested in UNSA-CS are comparing it to the libraries listed below
- CS155: Network and Web Security Projects☆12Updated 2 years ago
- ☆18Updated 5 years ago
- ☆12Updated 3 years ago
- matlab实现的信息隐藏☆8Updated 4 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆11Updated 11 months ago
- ☆12Updated 4 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- converting malware .bytes file to image☆10Updated 6 years ago
- Security papers about software vulnerabilities and exploits☆13Updated 6 years ago
- The toolchain of Chosen-instruction attack☆18Updated 2 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆29Updated 6 months ago
- To store some files that I prepared for recommended postgraduate.☆14Updated 5 years ago
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆24Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated 8 months ago
- ☆19Updated 3 years ago
- 一个简单的windows的远程控制程序☆13Updated 7 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated last year
- ☆16Updated 7 months ago
- Trusted I/O Paths for SGX Enclaves☆16Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated last month
- ☆12Updated 2 years ago
- ☆61Updated 2 years ago
- CFG explorer for binaries☆37Updated 5 months ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- Extracts and visualizes control flow graphs for assembly code.☆13Updated 6 years ago
- 使用Linux Security Module 为linux内核添加基于角色的访问控制功能☆9Updated 6 years ago
- 国科大编 译作业:基于Clang的C语言解释执行器☆40Updated 3 years ago