peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆10Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆179Updated last month
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆118Updated 5 months ago
- ☆32Updated 5 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 8 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆43Updated last year
- ☆32Updated 3 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆36Updated 4 years ago
- ☆27Updated last year
- ☆39Updated 5 months ago
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆87Updated last year
- Have fun with audit log analysis :)☆152Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆141Updated 2 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- ☆14Updated 3 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 10 months ago
- ☆26Updated 2 years ago
- ☆20Updated 9 months ago
- ☆34Updated 2 years ago
- ☆64Updated this week
- Tool to symbolically execute eBPF programs☆14Updated last year
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- ☆25Updated 6 months ago
- Poise source code repo☆12Updated 5 years ago
- [Usenix Security '25] Robustifying ML-powered Network Classifiers with PANTS☆11Updated last month
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 4 months ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆24Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆17Updated 11 months ago
- ☆22Updated last year