xinjin95 / IoTSpotter
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for IoTSpotter
- FirmSec Dataset☆30Updated 2 years ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆39Updated 9 months ago
- ☆23Updated 2 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated this week
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆41Updated last year
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆36Updated 11 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆27Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 6 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- This is the official repository for VulHawk.☆65Updated last year
- ☆15Updated 2 months ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆43Updated last year
- A curated list of malware-related papers.☆22Updated 8 months ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆29Updated 3 weeks ago
- ☆33Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆40Updated 2 years ago
- ☆23Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆34Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆22Updated 11 months ago
- a blackbox network fuzzer for IoT devices☆51Updated 2 months ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- 2019 and 2020 Top Conference Paper☆13Updated 3 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆51Updated last year
- ☆50Updated 10 months ago
- A collection of security papers on top-tier publications☆35Updated last month
- ☆10Updated 4 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 5 years ago