MeghaJakhotia / ComputerSecurityAttacks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆103Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for ComputerSecurityAttacks
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆40Updated 4 years ago
- Records & Reports for Seed-project☆88Updated 3 years ago
- Source code for my books☆154Updated last year
- SEED Labs developed in the last 20 years.☆769Updated 2 months ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Updated 2 years ago
- Online textbook for CS 161: Computer Security at UC Berkeley.☆68Updated this week
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆20Updated 5 months ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- Resources for learning about cybersecurity and CTFs☆185Updated last year
- vulnerability detection in python source code with LSTM networks☆118Updated 4 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- ☆43Updated last year
- ☆30Updated 3 years ago
- ☆11Updated 5 years ago
- Popular Android malware datasets☆149Updated 6 years ago
- Have fun with audit log analysis :)☆141Updated 6 months ago
- Personal Notes About Everything.☆447Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆18Updated last week
- Solutions to Software Security course provided by University of Maryland - Coursera☆18Updated 3 years ago
- Public datasets to help you address various cyber security problems.☆357Updated 2 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆13Updated 4 years ago
- A Python framework for creating emulation of the Internet.☆209Updated this week
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆46Updated last year
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆56Updated 8 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆59Updated 3 months ago
- Teaching and Learning Software Verification via SVF☆32Updated last month
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year