IoT Reading List (IoT research papers from 2016 to 2019)
☆85Jan 1, 2019Updated 7 years ago
Alternatives and similar repositories for IoTResearch
Users that are interested in IoTResearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- Website for BrickSchema☆11Dec 14, 2023Updated 2 years ago
- ☆18Dec 16, 2024Updated last year
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 5 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆25Mar 24, 2023Updated 3 years ago
- Protecting user secrets from compromised browsers and operating systems☆19Sep 14, 2018Updated 7 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Apr 4, 2015Updated 10 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- Framework for Crowd-sourced Machine Learning☆16Jul 3, 2017Updated 8 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆459Mar 22, 2024Updated 2 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77May 12, 2022Updated 3 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆33Feb 9, 2022Updated 4 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- SmartThings Analysis Tools☆25Apr 23, 2016Updated 9 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- Personal Information Exfiltration Detection Using Machine Learning☆29Jun 21, 2018Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago