Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P
☆15May 16, 2017Updated 8 years ago
Alternatives and similar repositories for ongoing-submission-plan
Users that are interested in ongoing-submission-plan are comparing it to the libraries listed below
Sorting:
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- BSidesVienna Homepage☆16Updated this week
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆42Feb 18, 2018Updated 8 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- ☆20Mar 6, 2015Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19May 21, 2015Updated 10 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- A tool which automates and simplifies the on-device fuzzing of MobileSafari.☆24Jan 6, 2016Updated 10 years ago
- ☆23Nov 16, 2015Updated 10 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- ☆25Nov 16, 2015Updated 10 years ago
- Android Security☆29Mar 14, 2014Updated 11 years ago
- ☆35Jan 5, 2017Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- A security plug-in in Xcode plus a Clang Static Analyzer Checkers for iOS application development. This plug-in aims to reduce the vulner…☆68Feb 5, 2015Updated 11 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Dec 6, 2017Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A Heathkit ET-3400 Emulator written in C#☆13Sep 1, 2021Updated 4 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- lightweight system for profiling XDP applications using kfuncs☆19Jun 27, 2025Updated 8 months ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆17Apr 3, 2025Updated 11 months ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Checkpointing PoW blockchains with HotStuff BFT☆10Jan 5, 2022Updated 4 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆52Jan 19, 2016Updated 10 years ago
- ☆10Oct 22, 2019Updated 6 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago