prncoprs / best-papers-in-computer-securityLinks
This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.
☆117Updated 5 months ago
Alternatives and similar repositories for best-papers-in-computer-security
Users that are interested in best-papers-in-computer-security are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆179Updated last month
- A collection of security papers on top-tier publications☆53Updated last month
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆86Updated 8 months ago
- ☆29Updated 11 months ago
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 3 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆748Updated 2 weeks ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆187Updated last year
- Seminar 2022☆21Updated 2 months ago
- A curated list of malware-related papers.☆32Updated last year
- ☆21Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- ☆32Updated 5 months ago
- ☆24Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆72Updated 10 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆292Updated 9 months ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆43Updated last week
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆351Updated 2 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Updated 11 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 5 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 4 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆49Updated 3 months ago
- Academic Papers about LLM Application on Security☆193Updated 2 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆22Updated last year
- Official repository for ResolverFuzz☆17Updated last year
- FirmSec Dataset☆39Updated 3 years ago
- ☆43Updated 3 weeks ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 8 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆54Updated last year