TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22
☆14Jul 14, 2022Updated 3 years ago
Alternatives and similar repositories for TeLL
Users that are interested in TeLL are comparing it to the libraries listed below
Sorting:
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆59Mar 27, 2023Updated 2 years ago
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆40Oct 31, 2022Updated 3 years ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆18Jun 4, 2024Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆12Dec 5, 2024Updated last year
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Diagnose performance issues in macOS based on mac_tracing.☆19May 16, 2021Updated 4 years ago
- For NUS PhD Students and Staffs, just one click to open the research papers on Google Scholar/IEEE/ACM, etc. with this script.☆25Jul 11, 2024Updated last year
- data story tech-blog☆10Jul 21, 2023Updated 2 years ago
- Raspbian with OP-TEE support.☆30Mar 17, 2019Updated 6 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆81Oct 15, 2025Updated 4 months ago
- ☆30Nov 29, 2021Updated 4 years ago
- PatchEval: A New Benchmark for Evaluating LLMs on Patching Real-World Vulnerabilities☆188Dec 26, 2025Updated 2 months ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆47Jun 19, 2025Updated 8 months ago
- ☆10Sep 28, 2020Updated 5 years ago
- Have fun with audit log analysis :)☆154May 5, 2024Updated last year
- A Unreal Engine plugin to create AVG Games☆13Nov 28, 2021Updated 4 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- ⚠️ ARCHIVED - All development moved to https://github.com/itbench-hub/ITBench/tree/main/scenarios☆15Feb 24, 2026Updated last week
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- A tiny script to convert your mdx dictionary file to CSV☆11Dec 22, 2018Updated 7 years ago
- ☆11May 3, 2019Updated 6 years ago
- 软件工程与计算II☆11Dec 29, 2020Updated 5 years ago
- TLAi+ Benchmarks☆28Feb 6, 2026Updated 3 weeks ago
- ☆14Nov 11, 2025Updated 3 months ago
- ☆11Jun 10, 2024Updated last year
- ☆10Sep 4, 2020Updated 5 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- ☆11Aug 19, 2016Updated 9 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- A Terraform module to create and manage a Google Kubernetes Engine (GKE) Autopilot Cluster on Google Cloud Platform (GCP) https://cloud.g…☆10Nov 14, 2022Updated 3 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago