peng-gao-lab / p4controlLinks
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
☆10Updated last year
Alternatives and similar repositories for p4control
Users that are interested in p4control are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆35Updated last year
- Have fun with audit log analysis :)☆152Updated last year
- Implementation of the Reusable Enclaves paper☆13Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 4 months ago
- ☆26Updated last year
- ☆31Updated last month
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆22Updated 6 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 3 years ago
- Poise source code repo☆12Updated 4 years ago
- ☆32Updated 2 years ago
- Academic Papers about LLM Application on Security☆135Updated 4 months ago
- Privacy Budget Orchestration in Machine Learning Workloads (OSDI '21)☆24Updated last year
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- ☆14Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Updated 4 years ago
- ☆32Updated 2 months ago
- ☆34Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆29Updated 7 months ago
- ☆31Updated 2 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Artifacts accompanying the NSDI '24 paper: Leo: Online ML-based Traffic Classification at Multi-Terabit Line Rate.☆16Updated last year
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆12Updated last year
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- ☆31Updated 4 months ago