zhliuworks / Linux-Kernel-notes
🌟 Notes and codes for Linux Kernel (SJTU-CS353)
☆25Updated 3 years ago
Related projects: ⓘ
- My solutions to NJU Static Program Analysis assignments: https://tai-e.pascal-lab.net/en/intro/overview.html☆41Updated last year
- ☆72Updated 2 years ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆20Updated last month
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆33Updated 2 months ago
- ☆27Updated 2 years ago
- 国科大编译作业:基于Clang的C语言解释执行器☆33Updated 2 years ago
- ☆58Updated 2 years ago
- 国科大编译作业三:Point to 分析☆14Updated 2 years ago
- ☆43Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆35Updated 9 months ago
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆28Updated 5 years ago
- ☆96Updated this week
- Academic Papers about LLM Application on Security☆94Updated 3 months ago
- Latex Template for UCAS Homework☆27Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆89Updated last week
- ☆25Updated 2 weeks ago
- This is the implementation repository of our ICSE'22 paper: Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.☆29Updated 2 years ago
- Repository for Software Security curriculum☆15Updated 4 years ago
- 2022 年春季学期清华大学《软件分析与验证》课程实验平台☆193Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆27Updated 5 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆9Updated 5 months ago
- A collection of security papers on top-tier publications☆35Updated this week
- 国科大编译作业二:LLVM Pass处理函数调用☆14Updated 2 years ago
- Proposal for the next generation of course-oriented IR.☆10Updated 2 years ago
- Collect simple coverage information in memory.☆11Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆56Updated 3 weeks ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- ☆23Updated 7 years ago
- Anderson points-to analysis implementation based on LLVM☆12Updated 3 years ago