lx913 / Security_Papers_CrawlingLinks
Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.
☆13Updated 5 months ago
Alternatives and similar repositories for Security_Papers_Crawling
Users that are interested in Security_Papers_Crawling are comparing it to the libraries listed below
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆125Updated 6 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆193Updated 2 weeks ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆60Updated 5 months ago
- ☆25Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆47Updated 2 years ago
- ☆31Updated last year
- A collection of security papers on top-tier publications☆56Updated last month
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- Seminar 2022☆21Updated 3 weeks ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆74Updated 11 months ago
- TensorFlow API analysis tool and malicious model detection tool☆36Updated 5 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆37Updated 3 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆87Updated 9 months ago
- ☆34Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆23Updated 7 months ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆44Updated last year
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆19Updated 9 months ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 5 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 7 months ago
- ☆123Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆65Updated 7 months ago
- ☆19Updated 11 months ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆84Updated 3 weeks ago
- ☆21Updated last year