weizhou-chaojixx / IoT-security-papersView external linksLinks
research and survey papers related to IoT security from 2014 to the first half of 2019
☆60Jun 14, 2020Updated 5 years ago
Alternatives and similar repositories for IoT-security-papers
Users that are interested in IoT-security-papers are comparing it to the libraries listed below
Sorting:
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- A Specification-Guided Approach for Firmware Emulation☆44Apr 22, 2025Updated 9 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆145Nov 20, 2023Updated 2 years ago
- 2021西湖论剑IoT、虚实结合赛 后开放资源☆65Mar 18, 2022Updated 3 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- Parsing-based Analyzer☆70Jun 8, 2025Updated 8 months ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- ☆13Feb 22, 2022Updated 3 years ago
- Exploit code by DirtyChain☆11Apr 11, 2025Updated 10 months ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Repository for monolithic firmware blobs☆88Mar 10, 2022Updated 3 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- some ida script☆34Aug 18, 2021Updated 4 years ago
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- Scripts for the Ghidra.☆308Nov 1, 2021Updated 4 years ago
- Browser Fuzz Summarize / 浏览器模糊测试综述☆142Oct 4, 2020Updated 5 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆18Oct 13, 2020Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆14Feb 9, 2018Updated 8 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- ☆17Sep 22, 2024Updated last year
- Generates `.pyi` type stubs for the entire Ghidra API☆152Feb 6, 2025Updated last year
- ☆18Dec 16, 2024Updated last year
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 4 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Driver Security Analyzer☆53Oct 27, 2020Updated 5 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆341May 27, 2024Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆421Sep 18, 2021Updated 4 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 5 years ago
- CTF-RSA-tool☆19Nov 27, 2019Updated 6 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago