lx913 / Security_Papers_CrawlingLinks
Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.
☆13Updated 8 months ago
Alternatives and similar repositories for Security_Papers_Crawling
Users that are interested in Security_Papers_Crawling are comparing it to the libraries listed below
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 10 months ago
- TensorFlow API analysis tool and malicious model detection tool☆39Updated 8 months ago
- ☆31Updated last year
- A collection of security papers on top-tier publications☆61Updated 2 weeks ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆95Updated last year
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Updated 10 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 9 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Updated 8 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Updated 5 months ago
- ☆127Updated last year
- ☆55Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16Updated 8 months ago
- ☆34Updated last year
- Seminar 2022☆23Updated last month
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆332Updated 3 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆76Updated last year
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆104Updated last year
- ☆27Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆27Updated 2 years ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆21Updated 6 months ago
- ☆21Updated 3 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆84Updated 2 years ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆100Updated this week