☆16Sep 17, 2024Updated last year
Alternatives and similar repositories for CipherSteal
Users that are interested in CipherSteal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 21, 2023Updated 2 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- ☆33Jan 26, 2025Updated last year
- Code for tracelet-level symbolic execution☆18Sep 18, 2022Updated 3 years ago
- Research Artifact For Our Submission To VLDB☆11Oct 27, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- A test suite (a.k.a., dataset) with ~20k moral situations for understanding LLMs' behaviors.☆16May 5, 2023Updated 2 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- ☆31Jun 7, 2023Updated 2 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆33Jul 2, 2025Updated 9 months ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆16Sep 5, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Dec 17, 2022Updated 3 years ago
- A memory profiler for NVIDIA GPUs to explore memory inefficiencies in GPU-accelerated applications.☆34Oct 13, 2024Updated last year
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆40Oct 17, 2025Updated 5 months ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- ☆19Nov 7, 2024Updated last year
- A Confidential Computing-Aware Certificate Authority☆11Apr 10, 2026Updated last week
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Jan 24, 2024Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- [SDM'23] ML4C: Seeing Causality Through Latent Vicinity☆14Nov 9, 2022Updated 3 years ago
- Camouflage YOLO - (CAMOLO) trains adversarial patches to confuse the YOLO family of object detectors.☆12Oct 20, 2022Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Repo for paper *Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges*☆298Jun 30, 2025Updated 9 months ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆18Sep 16, 2025Updated 7 months ago
- ☆77Apr 18, 2025Updated 11 months ago
- A blog engine. Code for roselia.moe/blog☆10Feb 11, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Mar 9, 2025Updated last year
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 2 months ago
- ☆20Oct 24, 2024Updated last year
- A fault injection framework for spiking neural networks☆11Mar 20, 2026Updated 3 weeks ago
- ☆25Mar 26, 2025Updated last year
- [NeurIPS 2024] Advancing Training Efficiency of Deep Spiking Neural Networks through Rate-based Backpropagation☆19Jan 16, 2025Updated last year