PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22
☆24Nov 11, 2024Updated last year
Alternatives and similar repositories for Palantir
Users that are interested in Palantir are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆63Mar 27, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆32Feb 23, 2022Updated 4 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆19Nov 27, 2024Updated last year
- ☆34Nov 7, 2022Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆19Jun 4, 2024Updated last year
- ☆46Sep 8, 2023Updated 2 years ago
- Implementation of Tagged Memory security policies into Rocket Core☆10Nov 8, 2016Updated 9 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A feedback-driven, evolutionary fuzzer for the CPython JIT compiler.☆22Mar 12, 2026Updated 2 weeks ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- Hypervisor written in Rust for the RISC-V 1.0 hypervisor extension☆16Oct 21, 2024Updated last year
- ☆11Jun 10, 2024Updated last year
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆21Mar 16, 2026Updated last week
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆13Dec 5, 2024Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- ☆14Nov 11, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- For NUS PhD Students and Staffs, just one click to open the research papers on Google Scholar/IEEE/ACM, etc. with this script.☆25Jul 11, 2024Updated last year
- ☆16Nov 13, 2023Updated 2 years ago
- An Rust hypervisor for mixed-critical system☆31Sep 6, 2025Updated 6 months ago
- A lightweight tool for detecting bugs on Graph Database Management Systems☆15Jan 9, 2024Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- ☆30Nov 29, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆35Jul 23, 2023Updated 2 years ago
- An SoC with multiple RISC-V IMA processors.☆19Aug 1, 2018Updated 7 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆84Oct 15, 2025Updated 5 months ago
- ☆14Oct 11, 2017Updated 8 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆22Nov 1, 2025Updated 4 months ago
- Rapid prototyping and selection package for pure-Rust RISC-V firmware, with RustSBI + UEFI or RustSBI + LinuxBoot☆27Oct 18, 2024Updated last year
- ☆126May 3, 2023Updated 2 years ago