prncoprs / best-papers-in-computer-security
This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.
☆85Updated 2 weeks ago
Alternatives and similar repositories for best-papers-in-computer-security:
Users that are interested in best-papers-in-computer-security are comparing it to the libraries listed below
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆144Updated 2 months ago
- Academic Papers about LLM Application on Security☆134Updated 2 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆66Updated 3 months ago
- ☆26Updated 7 months ago
- A collection of security papers on top-tier publications☆44Updated last week
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- ☆17Updated 8 months ago
- A curated list of malware-related papers.☆27Updated last year
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆44Updated last month
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆11Updated 2 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆44Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆52Updated last year
- Seminar 2022☆21Updated last month
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆185Updated 8 months ago
- FirmSec Dataset☆34Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de …☆67Updated 5 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆13Updated 6 months ago
- ☆22Updated 8 months ago
- Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG (ISSTA 2025)☆18Updated last week
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated this week
- ☆22Updated last year
- ☆16Updated 9 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆27Updated 2 months ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 3 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆44Updated last month