IoT Reading List (IoT research papers from 2016 to 2019)
☆85Jan 1, 2019Updated 7 years ago
Alternatives and similar repositories for IoTResearch
Users that are interested in IoTResearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- Securing Embedded Systems with Return Address Integrity☆16Aug 19, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 3 months ago
- ☆18Dec 16, 2024Updated last year
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 6 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- Protecting user secrets from compromised browsers and operating systems☆18Sep 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Apr 4, 2015Updated 11 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- Framework for Crowd-sourced Machine Learning☆16Jul 3, 2017Updated 8 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆459Mar 22, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated 2 months ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77May 12, 2022Updated 3 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- ☆20Jun 25, 2013Updated 12 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 6 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆425Sep 18, 2021Updated 4 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆33Feb 9, 2022Updated 4 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year