rewhy / saidLinks
A state-aware defense framework against vehicular message injection attacks.
☆35Updated 4 years ago
Alternatives and similar repositories for said
Users that are interested in said are comparing it to the libraries listed below
Sorting:
- On-device non-invasive dynamic analysis of Android apps with high code coverage☆15Updated 4 years ago
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- ☆24Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆36Updated 2 years ago
- FirmSec Dataset☆40Updated 3 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- ☆20Updated 4 years ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆31Updated last year
- ☆20Updated 4 years ago
- This is the official repository for VulHawk.☆72Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Fuzzing framework for Robot Operating System (ROS) and ROS-based robotic systems☆29Updated 2 months ago
- ☆21Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆72Updated 10 months ago
- ☆25Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- ☆23Updated last year
- ☆11Updated last year
- ☆21Updated 8 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆49Updated 3 months ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 4 months ago
- ☆44Updated 3 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆59Updated last year
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- ☆41Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆60Updated 2 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆72Updated 9 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year