xinjin95 / IoTSpotterLinks
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆12Updated 2 years ago
Alternatives and similar repositories for IoTSpotter
Users that are interested in IoTSpotter are comparing it to the libraries listed below
Sorting:
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆54Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 8 months ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆346Updated 2 weeks ago
- FirmSec Dataset☆36Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated 8 months ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆21Updated last year
- ☆29Updated 9 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆289Updated 11 months ago
- This is the official repository for VulHawk.☆71Updated 2 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆149Updated 2 years ago
- ☆34Updated 2 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆50Updated last year
- ☆18Updated 11 months ago
- TensorFlow API analysis tool and malicious model detection tool☆32Updated last month
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆70Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated 11 months ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆13Updated 4 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆161Updated 3 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆41Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆58Updated 2 months ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆33Updated last month
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- ☆31Updated 8 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆88Updated 2 years ago
- ☆57Updated last year
- DiAne is a smart fuzzer for IoT devices☆40Updated last year