Secure-Platforms-Lab-W-M / IoTSpotterLinks
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆11Updated 2 years ago
Alternatives and similar repositories for IoTSpotter
Users that are interested in IoTSpotter are comparing it to the libraries listed below
Sorting:
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆40Updated last year
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- ☆34Updated 2 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- ☆23Updated 9 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- ☆28Updated 9 months ago
- This is the official repository for VulHawk.☆70Updated 2 years ago
- ☆99Updated 8 months ago
- ☆50Updated 4 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 3 weeks ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆23Updated this week
- ☆18Updated 10 months ago
- Full implementaion of Genius☆31Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆56Updated 5 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆32Updated 3 years ago
- ☆20Updated 3 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆77Updated 2 years ago
- ☆61Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 5 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- ☆46Updated last month
- a blackbox network fuzzer for IoT devices☆53Updated 9 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 6 months ago