Beerkay / IoTResearch
IoT Reading List (IoT research papers from 2016 to 2019)
☆85Updated 6 years ago
Alternatives and similar repositories for IoTResearch:
Users that are interested in IoTResearch are comparing it to the libraries listed below
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆64Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆13Updated 3 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆14Updated 4 years ago
- ☆44Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated 9 months ago
- ☆47Updated 4 years ago
- Research papers on ML for security☆33Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 5 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 6 years ago
- ☆28Updated last month
- ☆51Updated 4 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆33Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- ☆14Updated 3 years ago
- Detect missing check bugs in OS kernels☆109Updated last year
- source code for savior fuzzer☆126Updated 4 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆65Updated 5 months ago
- This repository is used to analysis the shared resources of different containers☆28Updated 2 months ago
- FirmSec Dataset☆32Updated 2 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆31Updated 4 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- ☆60Updated 2 years ago
- Concurrency Paper☆101Updated last year
- K-Miner☆75Updated 5 years ago
- ☆46Updated 3 years ago
- ☆64Updated 5 years ago
- IoT Security Reading List☆62Updated 4 years ago