ISLOUC / Conferences-And-JournalsLinks
CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)
☆30Updated 6 years ago
Alternatives and similar repositories for Conferences-And-Journals
Users that are interested in Conferences-And-Journals are comparing it to the libraries listed below
Sorting:
- 每周定期更新论文笔记分享的markdown以及图片☆186Updated 4 years ago
- ☆61Updated 3 years ago
- ☆19Updated 6 years ago
- 每日论文推荐☆293Updated 4 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- This repository is used to analysis the shared resources of different containers☆30Updated 10 months ago
- DiAne is a smart fuzzer for IoT devices☆41Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆59Updated 5 years ago
- A collection of security papers on top-tier publications☆52Updated last month
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆53Updated 5 years ago
- ☆51Updated 4 years ago
- ☆46Updated 3 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 6 years ago
- ☆16Updated 3 years ago
- Precision-guided context sensitivity for pointer analysis☆61Updated 2 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆35Updated 2 years ago
- Seminar 2016☆25Updated last year
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆110Updated 4 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- Works about detecting vulnerable using ML.☆86Updated 5 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆99Updated last year
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- 程序分析大作业:使用 SOOT 框架,实现 Java 上的静态指针分析☆37Updated 7 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆33Updated 4 years ago
- ☆77Updated 2 weeks ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago