KimHyungSub / CPS-papersLinks
☆18Updated 3 months ago
Alternatives and similar repositories for CPS-papers
Users that are interested in CPS-papers are comparing it to the libraries listed below
Sorting:
- ☆11Updated 11 months ago
- ☆21Updated 11 months ago
- ☆21Updated 5 years ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Updated 5 years ago
- ☆24Updated last year
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Updated 3 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆40Updated 2 years ago
- ☆30Updated last month
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Fuzzing framework for Robot Operating System (ROS) and ROS-based robotic systems☆32Updated 5 months ago
- ☆42Updated 3 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆364Updated 5 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆788Updated this week
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 4 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Updated 3 years ago
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆12Updated 2 years ago
- ☆28Updated 3 years ago
- ☆28Updated last year
- DeepCrime - Mutation Testing Tool for Deep Learning Systems☆15Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Updated last year
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆15Updated 3 years ago
- Tool Competion on Testing Unmanned Aerial Vehicles☆14Updated 2 weeks ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- ☆27Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- ☆26Updated last year
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆54Updated last year
- Messaging protocol test tools☆16Updated 4 years ago
- A collection of academic papers / Git repos / conference talks / frameworks / tools related to cellular security and privacy.☆171Updated 2 months ago