ieee-security / ongoing-submission-planView external linksLinks
Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P
☆15May 16, 2017Updated 8 years ago
Alternatives and similar repositories for ongoing-submission-plan
Users that are interested in ongoing-submission-plan are comparing it to the libraries listed below
Sorting:
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- BSidesVienna Homepage☆16Nov 24, 2025Updated 2 months ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆42Feb 18, 2018Updated 7 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- ☆20Mar 6, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19May 21, 2015Updated 10 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- A tool which automates and simplifies the on-device fuzzing of MobileSafari.☆24Jan 6, 2016Updated 10 years ago
- ☆23Nov 16, 2015Updated 10 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- ☆25Nov 16, 2015Updated 10 years ago
- Android Security☆29Mar 14, 2014Updated 11 years ago
- ☆35Jan 5, 2017Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆36Oct 26, 2020Updated 5 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- A security plug-in in Xcode plus a Clang Static Analyzer Checkers for iOS application development. This plug-in aims to reduce the vulner…☆68Feb 5, 2015Updated 11 years ago
- A Heathkit ET-3400 Emulator written in C#☆13Sep 1, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Github老玩家自己搭的服务器,老飞飞原版,可联机-天马座☆11May 14, 2019Updated 6 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11May 3, 2024Updated last year
- TLS WG Wiki☆13Jan 16, 2026Updated 3 weeks ago
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Aug 26, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Mar 4, 2020Updated 5 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- CTF Writeups for the UW CTF Team☆14Dec 4, 2019Updated 6 years ago
- Tool to fetch and analyze blockchain transactions☆10Mar 9, 2021Updated 4 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Checkpointing PoW blockchains with HotStuff BFT☆10Jan 5, 2022Updated 4 years ago