Samsonsjarkal / StealthyIMULinks
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Updated 2 years ago
Alternatives and similar repositories for StealthyIMU
Users that are interested in StealthyIMU are comparing it to the libraries listed below
Sorting:
- This repository provides the implementation of the MobiCom 23 Workshop's (WiNTECH 23) paper-- Wi-BFI☆50Updated 2 weeks ago
- Repo for MobiCom 2022 paper: " Cosmo: Contrastive Fusion Learning with Small Data for Multimodal Human Activity Recognition ".☆56Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- One-shot Recognition for Unseen Gesture with COTS WiFi☆39Updated 3 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆15Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆43Updated 10 months ago
- ☆18Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Libraries and usage example for our MMFi Dataset☆141Updated last year
- Repository collating CSI data samples and datasets.☆82Updated 4 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- 802.11n CSI Tool based on iwlwifi and Linux☆80Updated 6 years ago
- ☆21Updated last year
- ☆29Updated 4 years ago
- ☆500Updated 2 years ago
- ☆53Updated 2 years ago
- ☆108Updated 11 months ago
- Corrupted files generator. Random bits flipper.☆27Updated 2 years ago
- The official PyTorch Implementation of MetaSense (MetaSense: Few-Shot Adaptation to Untrained Conditions in Deep Mobile Sensing, ACM SenS…☆17Updated 3 years ago
- Gesture recognition by wifi channel state information (CSI)☆18Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆106Updated last year
- ☆17Updated 2 years ago
- ☆59Updated 6 years ago
- ☆17Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Another vulnerability scanner☆18Updated 5 months ago
- ☆67Updated 5 years ago
- XRF55: A Radio Frequency Dataset for Human Indoor Action Analysis☆57Updated 3 weeks ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆63Updated 11 months ago