gchers / fbleauLinks
A tool for estimating a system's information leakage via Machine Learning
☆10Updated 11 months ago
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated 11 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- Teaching materials related to the Tamarin Prover☆70Updated 10 months ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- HotCRP conference review software☆358Updated this week
- This is a Tamarin model of TLS 1.3☆37Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆722Updated this week
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆15Updated 4 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆10Updated last year
- ☆38Updated 2 years ago
- ☆31Updated last month
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- On the TOCTOU Problem in Remote Attestation☆14Updated last year
- ☆22Updated last year
- ☆31Updated last year
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 5 years ago
- This repository contains several tools to perform Cache Template Attacks☆150Updated last year
- ☆55Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆46Updated 5 years ago
- ☆20Updated last year
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆31Updated 7 years ago
- Vehicular component authentication and software isolation☆11Updated 3 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 3 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆102Updated 5 months ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- ☆44Updated 2 years ago