research and survey papers related to IoT security from 2014 to the first half of 2019
☆59Jun 14, 2020Updated 5 years ago
Alternatives and similar repositories for IoT-security-papers
Users that are interested in IoT-security-papers are comparing it to the libraries listed below
Sorting:
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- A Specification-Guided Approach for Firmware Emulation☆45Apr 22, 2025Updated 10 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆145Nov 20, 2023Updated 2 years ago
- 2021西湖论剑IoT、虚实结合赛后开放资源☆66Mar 18, 2022Updated 3 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- ☆164Oct 6, 2021Updated 4 years ago
- Parsing-based Analyzer☆71Jun 8, 2025Updated 9 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Exploit code by DirtyChain☆12Apr 11, 2025Updated 10 months ago
- ☆13Feb 22, 2022Updated 4 years ago
- Caputre the flag with Large Language Models☆28Aug 5, 2025Updated 7 months ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 3 years ago
- fuzzing + concolic = fuzzolic :)☆128Nov 6, 2025Updated 4 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- Scripts for the Ghidra.☆310Nov 1, 2021Updated 4 years ago
- Browser Fuzz Summarize / 浏览器模糊测试综述☆142Oct 4, 2020Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆13Feb 9, 2018Updated 8 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- 从admin冲到TrustedInstaller☆17Feb 3, 2023Updated 3 years ago
- OWASP WAP - Web Application Protection Project☆11Jul 24, 2019Updated 6 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆22Oct 13, 2020Updated 5 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆152Feb 6, 2025Updated last year
- ☆18Dec 16, 2024Updated last year
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 5 months ago
- Library for manipulating gdb in batch mode☆21Mar 10, 2024Updated last year
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Driver Security Analyzer☆53Oct 27, 2020Updated 5 years ago