YuanchengJiang / recipe-benchmarkView external linksLinks
Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses
☆13Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for recipe-benchmark
Users that are interested in recipe-benchmark are comparing it to the libraries listed below
Sorting:
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆40Oct 31, 2022Updated 3 years ago
- ☆14Nov 11, 2025Updated 3 months ago
- ☆10Jun 10, 2024Updated last year
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 3 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 5 months ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆59Mar 27, 2023Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆26Dec 18, 2025Updated last month
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- ☆13Oct 17, 2021Updated 4 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- Securing System Logs With Intel SGX☆16Mar 31, 2017Updated 8 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆18Jun 4, 2024Updated last year
- ☆41Feb 26, 2023Updated 2 years ago
- Diagnose performance issues in macOS based on mac_tracing.☆19May 16, 2021Updated 4 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 3 months ago
- ☆18Sep 4, 2023Updated 2 years ago
- ☆30Feb 9, 2026Updated last week
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Nov 25, 2023Updated 2 years ago