Samsonsjarkal / StealthyIMU
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆17Updated last year
Related projects: ⓘ
- This repository provides the implementation of the MobiCom 23 Workshop's (WiNTECH 23) paper-- Wi-BFI☆30Updated 3 weeks ago
- This repository houses all files and research done for the purpose of building a system that is capable of making tracking a human using …☆41Updated 4 years ago
- ☆40Updated last year
- 802.11n CSI Tool based on iwlwifi and Linux☆66Updated 4 years ago
- ☆21Updated 8 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆40Updated 5 months ago
- Gesture recognition by wifi channel state information (CSI)☆10Updated last year
- One-shot Recognition for Unseen Gesture with COTS WiFi☆29Updated 2 years ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆32Updated 2 years ago
- Libraries and usage example for our MMFi Dataset☆72Updated 2 months ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- ☆23Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- Another vulnerability scanner☆17Updated 10 months ago
- Gait Based User Recognition from Channel State Information(CSI) collected from WiFi Data☆27Updated 2 years ago
- ☆18Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- MUSHIKAGO-femto is an automated penetration testing and first aid tool☆15Updated 2 years ago
- Dataset and resources for CSI-based activity recognition applications using 802.11ax signals☆20Updated last year
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆19Updated 2 years ago
- ☆18Updated this week
- Public Code for ICS Evasion Attack Generation☆39Updated 3 years ago
- Nexus of Android banking Trojans☆14Updated 11 months ago
- Repo for MobiCom 2022 paper: " Cosmo: Contrastive Fusion Learning with Small Data for Multimodal Human Activity Recognition ".☆43Updated last year
- One-size-fits-all model for mobile AI, a novel paradigm for mobile AI in which the OS and hardware co-manage a foundation model that is c…☆14Updated 6 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated last year
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆1Updated last year
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆9Updated 2 years ago