peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆10Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- ☆14Updated 3 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆39Updated last year
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆47Updated 5 months ago
- ☆31Updated 2 months ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- Privacy Budget Orchestration in Machine Learning Workloads (OSDI '21)☆25Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- ☆27Updated last year
- Implementation of the Reusable Enclaves paper☆14Updated last year
- Have fun with audit log analysis :)☆153Updated last year
- Poise source code repo☆12Updated 4 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Updated 7 months ago
- ☆32Updated 5 months ago
- ☆31Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆21Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆97Updated 2 months ago
- ☆11Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆154Updated this week
- ☆33Updated 2 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆80Updated 2 years ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆18Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- ☆35Updated 2 years ago
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- Library for training globally-robust neural networks.☆28Updated last year
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago