peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆11Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Have fun with audit log analysis :)☆152Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Updated last year
- ☆35Updated last month
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Updated 4 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆45Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 8 months ago
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆91Updated 2 years ago
- ☆29Updated 2 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆17Updated 8 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆21Updated 2 years ago
- ☆10Updated 2 years ago
- ☆32Updated 3 years ago
- ☆34Updated 3 years ago
- Usenix Security'23☆16Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Updated 2 years ago
- ☆45Updated 9 months ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Updated 2 years ago
- ☆40Updated 2 years ago
- ☆23Updated last year
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- Codes for WF attacks, defenses☆86Updated 2 years ago
- ☆82Updated 10 months ago
- ☆31Updated last year
- ☆14Updated 4 years ago
- ☆22Updated last year