Qi-Pang / MPCDiff
This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.
☆14Updated last year
Alternatives and similar repositories for MPCDiff:
Users that are interested in MPCDiff are comparing it to the libraries listed below
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated last year
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆12Updated last year
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆33Updated 10 months ago
- ☆20Updated 5 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆23Updated 2 years ago
- ☆14Updated 7 years ago
- ☆28Updated 4 months ago
- ☆9Updated last year
- ☆44Updated 2 years ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- ☆46Updated 3 years ago
- ☆40Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated last month
- Code for tracelet-level symbolic execution☆17Updated 2 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 11 months ago
- ☆25Updated 5 months ago
- ☆32Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 4 months ago
- ☆31Updated 3 years ago
- ☆10Updated last year
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆14Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- The released code of FuzzGuard in USENIX Security 2020.☆28Updated 4 years ago
- PoC exploits against various SGX enclaves☆14Updated 2 years ago
- A collection of widely-fuzzed targets☆45Updated 5 years ago