CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)
☆30Jun 13, 2019Updated 6 years ago
Alternatives and similar repositories for Conferences-And-Journals
Users that are interested in Conferences-And-Journals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A new XNU kernel fuzzer with some extra features.☆13Feb 8, 2017Updated 9 years ago
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 16 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Jul 13, 2019Updated 6 years ago
- An Input Validator for HTTP based on Context-free Languages☆15Apr 27, 2017Updated 8 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- Hence☆21Nov 8, 2018Updated 7 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆14Aug 11, 2025Updated 8 months ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago
- ☆14Nov 14, 2023Updated 2 years ago
- ☆11May 18, 2022Updated 3 years ago
- ☆55Mar 30, 2020Updated 6 years ago
- A Distributed Analysis and Benchmarking Framework for Apache OpenWhisk Serverless Platform☆12Dec 11, 2018Updated 7 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- COSE: Configuring Serverless Functions using Statistical Learning☆10Jun 28, 2023Updated 2 years ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Nov 30, 2021Updated 4 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 3 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago
- the implementation of Embedding API Dependency Graph for Neural Code Generation☆12Jun 6, 2021Updated 4 years ago
- A pytorch implementation of Abstract Syntax Networks☆12Jun 27, 2025Updated 9 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Thallium is a C++14 library wrapping Margo, Mercury, and Argobots and providing an object-oriented way to use these libraries.☆14Apr 3, 2026Updated 2 weeks ago
- Papers of smart contract security analysis (and tools)☆36Jun 5, 2019Updated 6 years ago
- ☆18Jan 3, 2020Updated 6 years ago
- Automatic fuzz targets generation for Golang packages☆55Nov 12, 2025Updated 5 months ago
- ☆15Apr 15, 2022Updated 4 years ago
- Render pyecharts as image via phantomjs☆13Oct 14, 2020Updated 5 years ago
- An intuitive command-line tool for downloading and unpacking SourceMap files.☆10Oct 18, 2024Updated last year
- Run fuzzing experiments in Docker☆101Mar 17, 2021Updated 5 years ago
- Reference code for https://arxiv.org/abs/1906.08879☆18Oct 25, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Oct 2, 2021Updated 4 years ago
- ☆18Dec 4, 2025Updated 4 months ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- ☆44Jun 17, 2020Updated 5 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆51Sep 25, 2024Updated last year
- ☆18Apr 28, 2025Updated 11 months ago