Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.
☆15Oct 20, 2022Updated 3 years ago
Alternatives and similar repositories for stealthy-attacks
Users that are interested in stealthy-attacks are comparing it to the libraries listed below
Sorting:
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Oct 20, 2020Updated 5 years ago
- ☆21Oct 9, 2020Updated 5 years ago
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆12Dec 27, 2022Updated 3 years ago
- Verilog implementation of MC68851 Memory Management Unit☆13Feb 26, 2018Updated 8 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- ☆12Aug 26, 2016Updated 9 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- A better way to write shell code☆10May 28, 2021Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A curated list for Efficient Large Language Models☆11Mar 25, 2024Updated last year
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Multimedia SoC Design with Specialization on Application Acceleration with High-Level-Synthesis [2020 Fall]☆12Jun 15, 2021Updated 4 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- A DDR3 Controller that uses the Xilinx MIG-7 PHY to interface with DDR3 devices.☆11Aug 22, 2021Updated 4 years ago
- Model summary of keras pre-trained neural networks.☆12Aug 1, 2019Updated 6 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- This is Max's blog, something interesting in it.☆13Jan 1, 2023Updated 3 years ago
- Computational Memory Neural Network Compiler☆11Aug 11, 2021Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Verilog RTL Implementation of DNN☆10Jun 26, 2018Updated 7 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- https://nnsmith-asplos.rtfd.io Artifact of "NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers" ASPLOS'23☆11Mar 29, 2023Updated 2 years ago
- Class project for COMP-781, Robotics. This is a CUDA-based collision detector for motion planning.☆13Apr 29, 2019Updated 6 years ago
- Jumpstart your custom DNN accelerator today. This project holds scripts to build and start containers that can compile binaries to the ze…☆10Jun 17, 2020Updated 5 years ago
- 本仓库储存了全志V3s芯片的开发板相关资料。仓库中包含了开发板原理图、PCB和制造文件以及相对应的u-boot、Linux Kernel、Buildroot的构建脚本。This repository stores development board related inf…☆13Sep 5, 2023Updated 2 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- dMazeRunner: Dataflow acceleration optimization infrastructure for coarse-grained programmable accelerators☆47Apr 4, 2022Updated 3 years ago
- Heterogeneous Cluster Interconnect to bind special-purpose HW accelerators with general-purpose cluster cores☆14Updated this week
- PLCT实验室2019年开放日资料(OpenDay-2019)☆11Dec 20, 2019Updated 6 years ago
- ☆11Feb 22, 2026Updated last week
- Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters☆13Aug 15, 2022Updated 3 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Accelerate convolution neural network for face recognition using GPU☆13Nov 24, 2020Updated 5 years ago
- Here are some implementations of basic hardware units in RTL language (verilog for now), which can be used for area/power evaluation and …☆14Aug 25, 2023Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Tool using automatic template inference to find network misconfigurations☆13Jul 15, 2020Updated 5 years ago
- a cyclic redundancy check(one kind of Error Correcting Code) software(MATLAB) and hardware(Verilog HDL) implementation.☆11Dec 14, 2019Updated 6 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago