USENIX-Security-2025 / conference-formatLinks
☆22Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆161Updated 3 weeks ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆100Updated 3 months ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆733Updated last week
- ☆119Updated last year
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 2 months ago
- ☆31Updated 3 months ago
- A collection of security papers on top-tier publications☆48Updated 2 weeks ago
- ☆29Updated 9 months ago
- ☆31Updated 2 years ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆62Updated last week
- ☆40Updated 2 years ago
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆79Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆47Updated 3 months ago
- Teaching materials related to the Tamarin Prover☆70Updated 11 months ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆41Updated last year
- Seminar 2022☆21Updated this week
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆32Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆58Updated 2 months ago
- ☆74Updated 2 years ago
- ☆23Updated last year
- CodeGuard+: Constrained Decoding for Secure Code Generation☆11Updated 11 months ago
- ☆16Updated 10 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆11Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆37Updated 2 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆14Updated last year