kevin-w-du / BookCodeLinks
Source code for my books
☆170Updated 2 years ago
Alternatives and similar repositories for BookCode
Users that are interested in BookCode are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆894Updated 2 months ago
- Records & Reports for Seed-project☆97Updated 4 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 8 months ago
- A Python framework for creating emulation of the Internet.☆265Updated this week
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 7 years ago
- ☆182Updated last year
- Chinese translation of the SEED Labs☆55Updated last year
- 每日论文推荐☆292Updated 4 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆792Updated this week
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆125Updated 5 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- (与本人兴趣强相关的)各种安全or计算机资料收集☆751Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 8 months ago
- Personal Notes About Everything.☆536Updated 4 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆179Updated last year
- 2019 and 2020 Top Conference Paper☆12Updated 4 years ago
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- Writeups/solutions☆100Updated 5 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago
- Popular Android malware datasets☆164Updated 7 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- A collection of security papers on top-tier publications☆59Updated last week
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆438Updated 3 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Contains tools for solving RSA and other crypto problems in CTFs.☆335Updated 3 years ago