peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆10Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 7 months ago
- ☆32Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆167Updated last month
- ☆14Updated 3 years ago
- Implementation of the Reusable Enclaves paper☆14Updated last year
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆36Updated 4 years ago
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆86Updated last year
- ☆32Updated 4 months ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆42Updated last year
- ☆33Updated 2 years ago
- ☆61Updated 4 months ago
- Have fun with audit log analysis :)☆152Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆140Updated 2 years ago
- Poise source code repo☆12Updated 5 years ago
- ☆36Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated 2 years ago
- ☆34Updated 4 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 9 months ago
- ☆27Updated last year
- ☆32Updated 7 months ago
- ☆23Updated 5 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆105Updated 4 months ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆18Updated last year
- Data repository of NAssim☆26Updated 3 years ago
- ☆19Updated 5 years ago
- ☆20Updated 7 months ago
- Network Traffic Transformer to learn network dynamics from packet traces. Learn fundamental dynamics with pre-training and fine-tune to m…☆22Updated last year