rewhy / saidLinks
A state-aware defense framework against vehicular message injection attacks.
☆35Updated 4 years ago
Alternatives and similar repositories for said
Users that are interested in said are comparing it to the libraries listed below
Sorting:
- On-device non-invasive dynamic analysis of Android apps with high code coverage☆15Updated 4 years ago
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- ☆25Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆37Updated 2 years ago
- ☆20Updated 5 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- FirmSec Dataset☆42Updated 3 years ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆31Updated last year
- ☆20Updated 4 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Updated 4 years ago
- This is the official repository for VulHawk.☆72Updated 2 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Updated 4 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 4 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆185Updated 2 months ago
- ☆44Updated 3 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Updated 6 years ago
- Seminar 2022☆21Updated last week
- The scalable bug search for binaries☆69Updated 8 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 4 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆14Updated 7 months ago
- Unit test firmware evaluated in P2IM paper☆10Updated 4 years ago
- Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware☆12Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆75Updated 10 months ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- ☆10Updated 4 years ago