A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps
☆66Nov 22, 2019Updated 6 years ago
Alternatives and similar repositories for IoTBench-test-suite
Users that are interested in IoTBench-test-suite are comparing it to the libraries listed below
Sorting:
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Jan 1, 2019Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Here, we open source our measurement dataset and source code on IFTTT☆11Oct 23, 2018Updated 7 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- SmartThings Analysis Tools☆25Apr 23, 2016Updated 9 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆12May 6, 2020Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- ☆18Apr 27, 2018Updated 7 years ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆17Oct 17, 2022Updated 3 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Jan 30, 2019Updated 7 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ☆18Aug 7, 2020Updated 5 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- Build Docker images for unibench☆16Jan 1, 2021Updated 5 years ago
- static taint analysis of hybrid Android Apps (Java + HTML)☆13Jan 9, 2022Updated 4 years ago
- ☆67May 5, 2021Updated 4 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- ☆18Apr 17, 2018Updated 7 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- ☆43Mar 6, 2017Updated 9 years ago
- ☆47Jul 15, 2022Updated 3 years ago
- DEBS 2015 - Realtime Analytics Patterns with WSO2 CEP, Siddhi & Apache Storm☆16Nov 4, 2022Updated 3 years ago