Beerkay / IoTResearch
IoT Reading List (IoT research papers from 2016 to 2019)
☆83Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for IoTResearch
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆63Updated 4 years ago
- ☆44Updated 2 years ago
- 2019 and 2020 Top Conference Paper☆13Updated 3 years ago
- Project FlowCog (2017)☆26Updated 6 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 4 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆33Updated last year
- ☆27Updated 2 months ago
- ☆15Updated 3 years ago
- FirmSec Dataset☆29Updated 2 years ago
- Recent security papers on firmware analysis☆75Updated 3 years ago
- ☆50Updated 3 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆58Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 3 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- ☆19Updated 2 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆20Updated 8 years ago
- Securing Embedded Systems with Return Address Integrity☆14Updated 2 months ago
- ☆56Updated 3 years ago
- source code for savior fuzzer☆126Updated 4 years ago
- ☆64Updated 4 years ago
- ☆59Updated 7 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆13Updated 4 years ago
- Detect missing check bugs in OS kernels☆107Updated last year
- ☆91Updated last year
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- K-Miner☆72Updated 5 years ago
- Lifting network implementation to precise format specification☆22Updated last month