This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.
☆138Apr 17, 2025Updated 11 months ago
Alternatives and similar repositories for best-papers-in-computer-security
Users that are interested in best-papers-in-computer-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆340Nov 11, 2025Updated 4 months ago
- ☆15Sep 1, 2025Updated 6 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆53Jun 18, 2025Updated 9 months ago
- ☆16Aug 4, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Academic Papers about LLM Application on Security☆211Updated this week
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 5 months ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- A collection of security papers on top-tier publications☆61Mar 15, 2026Updated 2 weeks ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Feb 23, 2023Updated 3 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 10 months ago
- Seminar 2022☆23Mar 19, 2026Updated last week
- ☆32Oct 15, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- ☆30Aug 30, 2022Updated 3 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆811Updated this week
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆65Aug 11, 2021Updated 4 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- YuraScanner☆73Feb 13, 2025Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆29Jul 29, 2024Updated last year
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- Open-source code for RFCNLP paper.☆57Nov 9, 2022Updated 3 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago