yuqiChen94 / Swat_Simulator
☆12Updated 4 years ago
Alternatives and similar repositories for Swat_Simulator:
Users that are interested in Swat_Simulator are comparing it to the libraries listed below
- ☆27Updated 3 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆21Updated 2 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆32Updated 4 years ago
- ☆9Updated 4 years ago
- Website for Research Artifacts from the Security Community☆19Updated this week
- Security benchmarks for the Internet of Things☆22Updated 4 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 4 years ago
- ☆44Updated 2 years ago
- Material from ICS Village talk at DEFCON 25☆11Updated 6 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆33Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- ☆24Updated 2 years ago
- ☆12Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 2 months ago
- Practical Data-Only Attack Generation☆39Updated 10 months ago
- ☆24Updated 6 years ago
- Additional code and data for the automated malware generation paper☆12Updated 11 months ago
- ☆12Updated 3 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆41Updated 3 weeks ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆55Updated last year
- Protocol Inspection and State Machine Analysis☆24Updated 6 years ago
- Static analysis for llvm☆20Updated 10 years ago
- ☆53Updated 7 years ago
- ☆75Updated 3 years ago
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆32Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆69Updated 8 months ago
- ☆26Updated last year