ISLOUC / Conferences-And-JournalsLinks
CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)
☆30Updated 6 years ago
Alternatives and similar repositories for Conferences-And-Journals
Users that are interested in Conferences-And-Journals are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆186Updated 4 years ago
- This repository is used to analysis the shared resources of different containers☆30Updated 8 months ago
- 每日论文推荐☆293Updated 4 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆51Updated 5 years ago
- ☆19Updated 6 years ago
- 记录自己在看 afl 源码时候的一些笔记和想法 ,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆110Updated 4 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆59Updated 5 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated last year
- ☆50Updated 4 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆274Updated 5 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 6 years ago
- A collection of security papers on top-tier publications☆48Updated 2 weeks ago
- Seminar 2016☆25Updated 10 months ago
- ☆39Updated 2 years ago
- Works about detecting vulnerable using ML.☆85Updated 5 years ago
- fuzzing related paper☆227Updated 4 years ago
- ☆12Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆95Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆98Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- TensorFlow API analysis tool and malicious model detection tool☆32Updated last month
- ☆46Updated 3 years ago
- FirmSec Dataset☆10Updated 3 years ago
- ☆50Updated 4 years ago