ISLOUC / Conferences-And-JournalsLinks
CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)
☆30Updated 6 years ago
Alternatives and similar repositories for Conferences-And-Journals
Users that are interested in Conferences-And-Journals are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 years ago
- This repository is used to analysis the shared resources of different containers☆30Updated 8 months ago
- ☆39Updated 2 years ago
- Seminar 2016☆25Updated 10 months ago
- The released code of FuzzGuard in USENIX Security 2020.☆30Updated 5 years ago
- Chinese translation of the SEED Labs☆52Updated 9 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- A collection of security papers on top-tier publications☆43Updated this week
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 6 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆186Updated 4 years ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆51Updated 5 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆19Updated 6 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 3 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- ☆74Updated 2 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆34Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆82Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆32Updated last month
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- ☆16Updated 3 years ago
- Precision-guided context sensitivity for pointer analysis☆61Updated last year
- Awesome materials for software supply chain security☆18Updated 5 years ago
- FirmSec Dataset☆10Updated 3 years ago
- ☆28Updated 9 months ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Updated 4 years ago