gchers / fbleau
A tool for estimating a system's information leakage via Machine Learning
☆10Updated 10 months ago
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- On the TOCTOU Problem in Remote Attestation☆14Updated 11 months ago
- Teaching materials related to the Tamarin Prover☆70Updated 9 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆711Updated this week
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated 11 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- ☆19Updated last year
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆15Updated 4 years ago
- A single script to facilitate submitting papers to ArXiv.org☆17Updated 7 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 5 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Vehicular component authentication and software isolation☆11Updated 3 years ago
- A library for adversarial classifier evasion☆42Updated 10 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 5 years ago
- This repository contains several tools to perform Cache Template Attacks☆150Updated last year
- Concolic Testing for Deep Neural Networks☆119Updated 3 years ago
- A set of exercises for getting started with the Tamarin prover☆19Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆101Updated 5 months ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆11Updated 11 months ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆31Updated 7 years ago
- ☆22Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- ☆19Updated last year
- ☆55Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated last year
- This is a Tamarin model of TLS 1.3☆36Updated last year