☆21Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for SAVIOR
Users that are interested in SAVIOR are comparing it to the libraries listed below
Sorting:
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Oct 20, 2020Updated 5 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- experimental realization for Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicle in python☆12Sep 13, 2021Updated 4 years ago
- [PLDI 19'] An Inductive Synthesis Framework for Verifiable Reinforcement Learning☆14Jan 14, 2020Updated 6 years ago
- LLVM syntax highlight extension for VS Code☆14Jan 11, 2024Updated 2 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆40Sep 12, 2025Updated 6 months ago
- MPC for optimal autonomous navigation of a vehicle in the CARLA simulator☆12Jun 24, 2020Updated 5 years ago
- PoC exploits against various SGX enclaves☆13May 19, 2022Updated 3 years ago
- ☆10Jan 16, 2020Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- 利用区块链(以太坊)发放营业执照。Issue business license with blockchain.☆11Nov 30, 2025Updated 3 months ago
- ☆29Oct 27, 2023Updated 2 years ago
- A network-level collaboration framework for personal mobile devices☆15Jun 24, 2020Updated 5 years ago
- Adversarial Driving v.s. Autonomous Driving.☆23Jul 29, 2023Updated 2 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- -☆11Dec 18, 2022Updated 3 years ago
- This repository represents the official implementation of the mmHPE.☆12Oct 12, 2024Updated last year
- A library for analyzing LLVM bitcode in Haskell☆44Oct 9, 2014Updated 11 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- Character Motion Style Transfer☆11Nov 7, 2018Updated 7 years ago
- ☆42Feb 26, 2023Updated 3 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- a Lightning Network simulator☆21Jun 11, 2021Updated 4 years ago
- Sentiment analysis has been a popular field in natural language processing. Sentiments can be expressed explicitly or implicitly. Most cur…☆16Nov 3, 2021Updated 4 years ago
- Some simple LLVM Pass examples☆16Aug 7, 2022Updated 3 years ago
- List of state of the art papers, code, and other resources☆111Dec 3, 2022Updated 3 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- ☆13Jun 24, 2020Updated 5 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- DAPP:实现基于区块链的电子合同签署☆15Oct 19, 2021Updated 4 years ago
- PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)☆13Mar 20, 2022Updated 4 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- Tools for the CADCD dataset☆24Aug 30, 2019Updated 6 years ago
- Deep Sensor Fusion for Single Source Robustness☆12Feb 5, 2026Updated last month
- A collection of command-line tools based on Dyninst☆18Jun 3, 2021Updated 4 years ago