xinjin95 / IoTSpotter
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
☆10Updated last year
Alternatives and similar repositories for IoTSpotter:
Users that are interested in IoTSpotter are comparing it to the libraries listed below
- DiAne is a smart fuzzer for IoT devices☆40Updated 9 months ago
- FirmSec Dataset☆32Updated 2 years ago
- This is the official repository for VulHawk.☆67Updated last year
- ☆24Updated 3 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- a blackbox network fuzzer for IoT devices☆52Updated 4 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆44Updated 10 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- ☆21Updated last year
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆30Updated 2 months ago
- ☆23Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- ☆20Updated 4 months ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆70Updated 6 months ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆44Updated last year
- ☆14Updated 6 months ago
- A curated list of malware-related papers.☆23Updated 10 months ago
- ☆26Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆65Updated 5 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆27Updated last week
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- ☆94Updated 2 months ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- ☆91Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago