Yuanyuan-Yuan / CipherStealLinks
☆12Updated 11 months ago
Alternatives and similar repositories for CipherSteal
Users that are interested in CipherSteal are comparing it to the libraries listed below
Sorting:
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆11Updated last year
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 3 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- ☆61Updated 3 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆35Updated 2 years ago
- ☆27Updated 3 months ago
- ☆25Updated last year
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- ☆34Updated 2 years ago
- ☆68Updated 3 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Updated 6 months ago
- A collection of security papers on top-tier publications☆53Updated last month
- ☆33Updated 2 months ago
- cinspector - a static C source code analysis framework☆27Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆99Updated last year
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆48Updated 11 months ago
- ☆44Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆83Updated 3 months ago
- [USENIX Security 25] PatchAgent is a LLM-based practical program repair agent that mimics human expertise.☆86Updated 2 weeks ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 7 months ago
- Lifting network implementation to precise format specification☆24Updated 4 months ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆53Updated 5 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆43Updated this week
- ☆52Updated 4 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆34Updated 2 weeks ago