MeghaJakhotia / ComputerSecurityAttacks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆114Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks:
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
- Records & Reports for Seed-project☆95Updated 4 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆46Updated 4 years ago
- Source code for my books☆163Updated 2 years ago
- This repository contains my implementation of SEED Labs☆14Updated 4 years ago
- SEED Labs developed in the last 20 years.☆824Updated last month
- Repositório público para o perfil A da disciplina de Laboratório Multimédia 4 (2017/18) do curso de Novas Tecnologias da Comunicação, Uni…☆10Updated 6 years ago
- ✍️ All of the challenges I have written for CTFs☆51Updated 3 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆33Updated last year
- Personal Notes About Everything.☆498Updated 3 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Updated 4 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆82Updated last week
- IoT-Flock is an open-source tool for IoT Traffic Generation which supports the two widely used IoT Application Layer Protocols, i.e., MQT…☆28Updated 5 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆53Updated 5 months ago
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- course materials and references for its450☆32Updated 3 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆15Updated 4 years ago
- JerseyCTF 2022☆27Updated 3 years ago
- Weakness Identification Research Employing CFG Analysis and Machine Learning☆9Updated 6 years ago
- ☆37Updated 3 years ago
- Solutions for Network Security Labs offered by SEED Labs☆17Updated 3 years ago
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆17Updated 2 years ago
- ☆22Updated last year
- Walkthrough of Xv6 Memory Management☆46Updated last year
- This is source code for ELISE☆9Updated 3 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆144Updated last year
- TCP-like Go-back-n protocol using UDP socket API☆13Updated 7 years ago
- ☆27Updated last year