rewhy / saidLinks
A state-aware defense framework against vehicular message injection attacks.
☆35Updated 4 years ago
Alternatives and similar repositories for said
Users that are interested in said are comparing it to the libraries listed below
Sorting:
- On-device non-invasive dynamic analysis of Android apps with high code coverage☆15Updated 4 years ago
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- ☆26Updated 2 years ago
- ☆21Updated 5 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆38Updated 2 years ago
- ☆20Updated 4 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆16Updated 8 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆71Updated last year
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Updated 5 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- ☆23Updated 2 years ago
- FirmSec Dataset☆43Updated last month
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆30Updated last year
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- ☆21Updated 10 months ago
- Recent Paper About Bug Detection☆31Updated 6 years ago
- ☆26Updated last year
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- ☆43Updated 3 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆80Updated 11 months ago
- 2019 and 2020 Top Conference Paper☆12Updated 4 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Updated 6 years ago
- ☆12Updated 10 months ago
- ☆26Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆202Updated last month
- ☆49Updated 4 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Updated 3 years ago