li-xin-yi / seedlabLinks
Records & Reports for Seed-project
☆95Updated 4 years ago
Alternatives and similar repositories for seedlab
Users that are interested in seedlab are comparing it to the libraries listed below
Sorting:
- Source code for my books☆163Updated 2 years ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆118Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆15Updated 4 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 4 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- 西安电子科技大学(西电)网络与信息安全学院 2019 级操作系统实验报告 by arttnba3☆42Updated 11 months ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆10Updated last year
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- Academic Papers about LLM Application on Security☆135Updated 4 months ago
- Cryptography course slides at Harbin Institute of Technology☆188Updated last year
- Have fun with audit log analysis :)☆152Updated last year
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 3 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 10 months ago
- This repository is used to analysis the shared resources of different containers☆29Updated 7 months ago
- ☆31Updated last month
- ☆34Updated 2 years ago
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- A collection of academic papers / Git repos / conference talks / frameworks / tools related to cellular security and privacy.☆145Updated 2 weeks ago
- SEED Labs developed in the last 20 years.☆842Updated 3 weeks ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆21Updated 2 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆22Updated 2 years ago
- Static Analysis Course☆67Updated this week
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆25Updated last year
- ☆24Updated last year
- Online textbook for CS 161: Computer Security at UC Berkeley.☆75Updated 5 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆22Updated 6 months ago
- ☆32Updated 3 years ago
- ☆30Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆13Updated last year