USENIX-Security-2025 / conference-format
☆19Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- ☆30Updated last month
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆11Updated this week
- ☆22Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆88Updated last month
- ☆26Updated 7 months ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆57Updated 5 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated last week
- ☆111Updated 10 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆27Updated 2 months ago
- ☆40Updated last year
- ☆39Updated 7 months ago
- ☆74Updated 2 years ago
- CodeGuard+: Constrained Decoding for Secure Code Generation☆11Updated 9 months ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated 6 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆11Updated last year
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- ☆31Updated last year
- ☆17Updated last year
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆24Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆35Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆39Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆68Updated last year
- ☆17Updated 8 months ago
- Fuzzing Deep-Learning Libraries via Automated Relational API Inference (ESEC/FSE 2022)☆37Updated last year
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆14Updated last year