lx913 / Security_Papers_CrawlingLinks
Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.
☆13Updated 8 months ago
Alternatives and similar repositories for Security_Papers_Crawling
Users that are interested in Security_Papers_Crawling are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆208Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 9 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆91Updated 11 months ago
- A collection of security papers on top-tier publications☆60Updated last week
- TensorFlow API analysis tool and malicious model detection tool☆38Updated 7 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 8 months ago
- ☆31Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- ☆27Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 9 months ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Updated 2 years ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆93Updated 9 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- ☆10Updated 3 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- Seminar 2022☆23Updated last week
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Updated 10 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Updated last year
- [USENIX Security 25] PatchAgent is a LLM-based practical program repair agent that mimics human expertise.☆117Updated last month
- A curated list of malware-related papers.☆34Updated last year
- ☆22Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 9 months ago
- ☆126Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆23Updated 7 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆68Updated 5 months ago
- ☆34Updated last year