pasks87 / cybersecurity_automotive_canLinks
A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)
☆14Updated 4 years ago
Alternatives and similar repositories for cybersecurity_automotive_can
Users that are interested in cybersecurity_automotive_can are comparing it to the libraries listed below
Sorting:
- An open-source software based testing framework for automotive cybersecurity☆11Updated 2 years ago
- This repository contains material related to A Versatile Cybersecurity Development Lifecycle (AVCDL)☆111Updated last year
- ☆13Updated 4 years ago
- PlanFuzz is a novel dynamic testing tool for discovering semantic DoS vulnerability in AD behavioral planning (NDSS 2022)☆22Updated 3 years ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- ☆16Updated 3 years ago
- Car Hacking Village Philippines Repository☆39Updated 2 weeks ago
- Situation Coverage-based AV-Testing Framework in CALRA☆14Updated 2 years ago
- Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly☆18Updated 7 years ago
- ☆29Updated 2 weeks ago
- The repository hosts the code for the SBFT CPS Tool competition for testing autonomous cars.☆17Updated 11 months ago
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 4 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Updated 6 years ago
- ☆25Updated 2 years ago
- SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems☆27Updated 4 months ago
- A list of resources (papers, books, talks, frameworks, tools) for understanding fuzzing for IoT/embedded devices.☆49Updated 3 years ago
- A logic-based enterprise network security analyzer☆131Updated 2 years ago
- ☆14Updated 2 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆435Updated 2 weeks ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆131Updated 3 weeks ago
- ☆38Updated last month
- This repository contains reverse engineering results and resources for a few specific car models of a very specific car manufacturer. Ple…☆95Updated 6 years ago
- VerifAI is a software toolkit for the formal design and analysis of systems that include artificial intelligence (AI) and machine learnin…☆201Updated 2 weeks ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆129Updated 2 years ago
- ☆151Updated last month
- A curated list of research resources in automated vulnerability detection (AVD)☆34Updated 10 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Updated last year
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆15Updated 2 years ago