peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆11Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- Have fun with audit log analysis :)☆152Updated last year
- ☆34Updated 6 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆45Updated 10 months ago
- ☆32Updated 3 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆36Updated 4 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆47Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆196Updated 3 weeks ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆21Updated 2 years ago
- High-Fidelity Synthetic Network Traffic Generation☆65Updated last month
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Updated 11 months ago
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆87Updated 2 years ago
- ☆14Updated 4 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- ☆34Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆19Updated last year
- ☆28Updated 2 years ago
- ☆40Updated 7 months ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆13Updated 2 years ago
- Usenix Security'23☆16Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆126Updated 6 months ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Updated 4 years ago
- runs several layers of a deep learning model in TrustZone☆90Updated last year
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- ☆38Updated 2 years ago
- A browser extension that enhance your paper writting with ChatGPT☆27Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆23Updated 5 months ago
- Flow Interaction Graph based attack traffic detection system.☆173Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆28Updated 3 years ago