mkravchik / poisoning-ics-adView external linksLinks
Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggio, and Asaf Shabtai, SAC 2021.
☆14Mar 22, 2021Updated 4 years ago
Alternatives and similar repositories for poisoning-ics-ad
Users that are interested in poisoning-ics-ad are comparing it to the libraries listed below
Sorting:
- AutoEncoders for Event Detection (AEED): a Keras-based class for anomaly detection in water sensor networks.☆12Sep 17, 2018Updated 7 years ago
- ☆31Feb 15, 2017Updated 9 years ago
- ☆22May 11, 2022Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Jun 19, 2024Updated last year
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- Siemens Simatic S7 Metasploit Modules☆40Jul 14, 2012Updated 13 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- ☆14Feb 16, 2023Updated 3 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- GPThreatIntel-Summarizer is a Python tool that uses OpenAI models and CTI to automate report summarization. Extract key insights from CTI…☆21Feb 6, 2024Updated 2 years ago
- Dr. Orbiteex - TLE/OEM 3D/2D viewer and analyser☆13Jul 14, 2024Updated last year
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- Command-line utility for iteratively developing pipelines, deploying them at scale, and sharing data and derivatives☆10Jun 15, 2020Updated 5 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 9 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆14Dec 27, 2020Updated 5 years ago
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- SVP library that enables communication with energy lab equipment.☆13Sep 18, 2025Updated 4 months ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆16May 17, 2016Updated 9 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago
- Mandoline is an accurate, low-overhead dynamic slicer for Android applicaions.☆11Dec 24, 2025Updated last month
- ☆15Jan 30, 2025Updated last year
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- eAudit suite for recording provenance-related system calls on Linux☆17Jan 16, 2026Updated last month
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year