2019 and 2020 Top Conference Paper
☆12Apr 19, 2021Updated 4 years ago
Alternatives and similar repositories for Recent-IoT-Security-Paper
Users that are interested in Recent-IoT-Security-Paper are comparing it to the libraries listed below
Sorting:
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- ☆24Apr 13, 2023Updated 2 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Jan 1, 2019Updated 7 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆15Feb 18, 2025Updated last year
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 5 years ago
- ☆11Nov 14, 2024Updated last year
- Static Web page hosting☆15Feb 14, 2015Updated 11 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- Protect your docker container from the public internet☆12Sep 5, 2017Updated 8 years ago
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Sep 25, 2024Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- ☆17Aug 31, 2023Updated 2 years ago
- ☆10Apr 8, 2022Updated 3 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 2 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- ☆12Dec 31, 2019Updated 6 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Discord music bot using JDA, Lavaplayer, Spotify API, YoutubeAPI and PostgreSQL database.☆15Jun 2, 2025Updated 9 months ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Library for creating and parsing HCI packets.☆18Aug 6, 2018Updated 7 years ago
- ☆12Jul 26, 2022Updated 3 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Webcrawler to collect cookie data and usage purposes, built using OpenWPM.☆13Jun 3, 2023Updated 2 years ago
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago