gchers / fbleau
A tool for estimating a system's information leakage via Machine Learning
☆10Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for fbleau
- ACM consolidated LaTeX styles☆64Updated 5 years ago
- ☆18Updated 10 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆666Updated last week
- Teaching materials related to the Tamarin Prover☆63Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆117Updated 3 weeks ago
- ☆55Updated 5 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆83Updated 5 years ago
- ☆17Updated 7 months ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- A set of exercises for getting started with the Tamarin prover☆15Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 6 months ago
- On the TOCTOU Problem in Remote Attestation☆13Updated 5 months ago
- ☆20Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- A single script to facilitate submitting papers to ArXiv.org☆16Updated 6 years ago
- Website for Research Artifacts from the Security Community☆18Updated last month
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆63Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆12Updated 2 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated 9 months ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆13Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆115Updated 3 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆18Updated 4 years ago
- Securing Embedded Systems with Return Address Integrity☆14Updated 3 months ago
- Raspbian with OP-TEE support.☆24Updated 5 years ago
- ☆29Updated last year
- High-level performance analyser toolkit for Intel SGX☆39Updated 5 years ago