Yuanyuan-Yuan / CipherStealView external linksLinks
☆14Sep 17, 2024Updated last year
Alternatives and similar repositories for CipherSteal
Users that are interested in CipherSteal are comparing it to the libraries listed below
Sorting:
- ☆12Jul 21, 2023Updated 2 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- ☆31Jan 26, 2025Updated last year
- Code for tracelet-level symbolic execution☆18Sep 18, 2022Updated 3 years ago
- Research Artifact For Our Submission To VLDB☆10Oct 27, 2021Updated 4 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated 11 months ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- ☆30Jun 7, 2023Updated 2 years ago
- A test suite (a.k.a., dataset) with ~20k moral situations for understanding LLMs' behaviors.☆16May 5, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆16Sep 5, 2023Updated 2 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 2 years ago
- ☆25Mar 26, 2025Updated 10 months ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆36Oct 17, 2025Updated 3 months ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 7 months ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Dec 17, 2022Updated 3 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- ☆75Apr 18, 2025Updated 9 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- ☆10Sep 28, 2020Updated 5 years ago
- A fault injection framework for spiking neural networks☆11Dec 28, 2025Updated last month
- Repo for paper *Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges*☆293Jun 30, 2025Updated 7 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆104Jan 31, 2025Updated last year
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Mar 20, 2019Updated 6 years ago
- ☆24Jul 27, 2024Updated last year
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 3 months ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Implementation of MetaVQA.☆12Jul 3, 2021Updated 4 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆35Feb 4, 2026Updated last week
- ☆77Aug 29, 2025Updated 5 months ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- ☆11Mar 22, 2024Updated last year
- ☆12Apr 1, 2025Updated 10 months ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 3 weeks ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago