HexHive / pubstats
☆25Updated 2 weeks ago
Related projects: ⓘ
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆9Updated 5 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- This is the implementation repository of our ICSE'22 paper: Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.☆29Updated 2 years ago
- ☆29Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆89Updated last week
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆50Updated 6 years ago
- ☆58Updated 2 years ago
- ☆74Updated last year
- A browser extension that enhance your paper writting with ChatGPT☆26Updated 4 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆16Updated last year
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆36Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆27Updated 5 months ago
- configuration evolution dataset☆16Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆12Updated 9 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆35Updated 9 months ago
- ☆20Updated 3 months ago
- ☆24Updated 10 months ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆16Updated 3 years ago
- ☆18Updated 3 weeks ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆13Updated last year
- ☆21Updated 3 weeks ago
- ☆43Updated 2 years ago
- ☆11Updated 5 months ago
- ☆37Updated 8 months ago
- ☆29Updated last year
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated last year
- Academic Papers about LLM Application on Security☆94Updated 3 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆16Updated last year
- Seminar 2022☆20Updated last month