This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.
☆139Apr 17, 2025Updated last year
Alternatives and similar repositories for best-papers-in-computer-security
Users that are interested in best-papers-in-computer-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆220Oct 18, 2025Updated 6 months ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- ☆15Sep 1, 2025Updated 8 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆54Jun 18, 2025Updated 10 months ago
- The official implementation of the paper "AgentDyn: A Dynamic Open-Ended Benchmark for Evaluating Prompt Injection Attacks of Real-World …☆50May 2, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Aug 4, 2023Updated 2 years ago
- Academic Papers about LLM Application on Security☆211Mar 26, 2026Updated last month
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- Some literature published on topics around IoT & Cybersecurity☆14Oct 13, 2025Updated 6 months ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Feb 23, 2023Updated 3 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 11 months ago
- Seminar 2022☆25Mar 19, 2026Updated last month
- Deadline countdowns for academic conferences in Security and Privacy☆824Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆37Oct 15, 2025Updated 6 months ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 11 months ago
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 11 months ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- Recent security papers on firmware analysis☆79Aug 30, 2021Updated 4 years ago
- A cross compiler and standardized benchmarks for fully homomorphic encryption☆40Dec 29, 2023Updated 2 years ago
- ConFuzz is an advanced FPGA configuration engine fuzzing and rapid prototyping framework based on boofuzz and OpenOCD.☆16Apr 1, 2026Updated last month
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆64Aug 11, 2021Updated 4 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- YuraScanner☆79Feb 13, 2025Updated last year
- ANT-ACE: Advanced Compiler Ecosystem for Fully Homomorphic Encryption and Domain Specific Computing☆57Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Oct 13, 2020Updated 5 years ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated last year
- It is a network traffic classifier based on deep learning.☆53Mar 16, 2024Updated 2 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 8 months ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- Python tools for targeted pcap analysis.☆12Sep 9, 2015Updated 10 years ago
- Open-source code for RFCNLP paper.☆56Nov 9, 2022Updated 3 years ago