This repository contains 4000 vulnerable hardware designs. Currently this is in Jsonl format for directly using it for fine-tuning LLMs. This is open to everyone for use. Thanks!
☆22Mar 25, 2025Updated last year
Alternatives and similar repositories for Hardware-Vulnerability-Dataset
Users that are interested in Hardware-Vulnerability-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 29, 2024Updated last year
- ☆13Apr 25, 2025Updated 11 months ago
- ☆23Updated this week
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- 用AI帮忙制作鬼畜类视频☆29Nov 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ITC'99 benchmarks developed in the CAD Group at Politecnico di Torino☆70May 14, 2025Updated 11 months ago
- Pre-Silicon Hardware Fuzzing Toolkit☆62Aug 18, 2025Updated 8 months ago
- A basic implementation of a SAT attack on logic locking.☆13Jun 30, 2021Updated 4 years ago
- ☆116Nov 30, 2025Updated 4 months ago
- Hack@DAC 2021☆18Jul 24, 2024Updated last year
- A curated list of research and repositories on the novel technique of hardware fuzzing☆23Mar 26, 2026Updated 3 weeks ago
- ☆21Mar 30, 2023Updated 3 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆40Oct 17, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Implementation VexRiscv on ultra96☆13Apr 18, 2022Updated 4 years ago
- pytorch版损失函数,改写自科学空间文章,【通过互信息思想来缓解类别不平衡问题】、【将“softmax+交叉熵”推广到多标签分类问题】☆12Aug 22, 2021Updated 4 years ago
- ☆46May 28, 2023Updated 2 years ago
- ☆16Feb 9, 2022Updated 4 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆33Dec 23, 2025Updated 3 months ago
- Semantic Scaffolds for Pseudocode-to-Code Generation (accepted by ACL 2020)☆14Jun 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆23Mar 13, 2023Updated 3 years ago
- Information about the CodedotAI reading group sessions.☆12Aug 16, 2021Updated 4 years ago
- Python3入门机器学习 经典算法与应用 学习☆11Nov 9, 2018Updated 7 years ago
- Source code for ISSTA'24 paper "AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation"☆12Oct 21, 2024Updated last year
- The Common Evaluation Platform (CEP), based on UCB's Chipyard Framework, is an SoC design that contains only license-unencumbered, freely…☆26Sep 26, 2024Updated last year
- RBAC Auth manager for Yii2☆17Jul 19, 2020Updated 5 years ago
- [NeurIPS 2024] Self-Optimization Improves the Efficiency of Code Generation☆14May 10, 2025Updated 11 months ago
- Web前端加密场景下的参数抓包修改、参数模糊测试工具☆20Jul 22, 2024Updated last year
- ☆21Jan 25, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CodeRepoQA dataset☆15Feb 19, 2025Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- ☆17Nov 19, 2023Updated 2 years ago
- Generating Sentences from Disentangled Syntactic and Semantic Spaces☆11Jun 24, 2019Updated 6 years ago
- ☆11Jul 28, 2021Updated 4 years ago
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- JPEG的正向离散余弦变化、量化、Z字形编码、对DC编码、AC编码、熵编码以及图像重构☆13May 27, 2019Updated 6 years ago