xinjin95 / IoTSpotterLinks
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆12Updated 2 years ago
Alternatives and similar repositories for IoTSpotter
Users that are interested in IoTSpotter are comparing it to the libraries listed below
Sorting:
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆72Updated 10 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆47Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Updated last year
- FirmSec Dataset☆40Updated 3 years ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated 10 months ago
- ☆296Updated last year
- ☆58Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆43Updated last year
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆54Updated last year
- ☆57Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆353Updated 2 months ago
- This is the official repository for VulHawk.☆72Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆57Updated 6 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated 2 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆153Updated 2 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- ☆34Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆72Updated 9 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆30Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆39Updated 3 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆96Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆91Updated 3 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆61Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆165Updated 5 months ago
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆14Updated 6 months ago
- ☆19Updated last year