USENIX-Security-2025 / conference-formatLinks
☆22Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆211Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated this week
- Open-source code for RFCNLP paper.☆58Updated 3 years ago
- ☆127Updated last year
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 8 months ago
- PrivacyGo Data Clean Room (PGDCR) is an open-source project for easily building and deploying data collaboration framework to the cloud u…☆34Updated last year
- Website for Research Artifacts from the Security Community☆30Updated last week
- ☆27Updated 2 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated 4 months ago
- ☆43Updated 2 years ago
- Private and Reliable Neural Network Inference (CCS '22)☆22Updated 2 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆16Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆55Updated 10 months ago
- Differential Privacy Testing System☆22Updated 5 years ago
- A collection of security papers on top-tier publications☆61Updated 3 weeks ago
- A System for Debloating C/C++ Programs☆31Updated 4 years ago
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆82Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- ☆35Updated last month
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Updated 10 months ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 8 months ago