xinjin95 / IoTSpotterLinks
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆12Updated 2 years ago
Alternatives and similar repositories for IoTSpotter
Users that are interested in IoTSpotter are comparing it to the libraries listed below
Sorting:
- TensorFlow API analysis tool and malicious model detection tool☆39Updated 8 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆56Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆102Updated 2 years ago
- FirmSec Dataset☆46Updated 3 months ago
- ☆31Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Updated 2 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆371Updated 7 months ago
- ☆62Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Updated 2 years ago
- ☆23Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 8 months ago
- [AST'26] LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing☆23Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆42Updated last year
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Updated 10 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆93Updated 9 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆82Updated last year
- ☆23Updated last year
- ☆63Updated last year
- This is the official repository for VulHawk.☆74Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆56Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆94Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆75Updated 3 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆61Updated 6 years ago