USENIX-Security-2025 / conference-formatLinks
☆22Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆172Updated 2 weeks ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆109Updated 4 months ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆745Updated last week
- ☆32Updated 4 months ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆43Updated last year
- ☆121Updated last year
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 3 months ago
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆79Updated 2 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆37Updated 3 years ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆65Updated 3 weeks ago
- ☆31Updated 2 years ago
- A browser extension that enhance your paper writting with ChatGPT☆27Updated last year
- PrivacyGo Data Clean Room (PGDCR) is an open-source project for easily building and deploying data collaboration framework to the cloud u…☆33Updated 10 months ago
- Website for Research Artifacts from the Security Community☆27Updated this week
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆16Updated 10 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 5 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated last year
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- Private and Reliable Neural Network Inference (CCS '22)☆21Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- ☆41Updated 2 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- ☆24Updated last year
- A System for Debloating C/C++ Programs☆31Updated 4 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 7 months ago
- Differential Privacy Testing System☆22Updated 5 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆11Updated last year
- PoC exploits against various SGX enclaves☆14Updated 3 years ago