Security
Physically unclonable functions (PUFs) are foundational components that offer a cost-efficient and promising solution for diverse security applications, including countering integrated circuit (IC) counterfeiting, generating secret keys, and enabling lightweight authentication. PUFs exploit semiconductor variations in ICs to derive inherent responses from imposed challenges, creating unique challenge-response pairs (CRPs) for individual devices. Analyzing PUF security is pivotal for identifying device vulnerabilities and ensuring response credibility.
- Categories:
This dataset corresponds to the research paper - "A Comprehensive Vulnerability Assessment and Penetration Testing Procedure for Dark Websites". This dataset contains the dark web onion links on which the VAPT procedure was performed. The dataset includes links related to dark web cybercrime websites, namely fake Bitcoins, drugs, weapons, terrorism, malware, hacking, and
- Categories:
Iman Sharafaldin et al. generated the real time network traffic and these are made available at the Canadian Institute of Cyber security Institute website. The team of researchers published the network traffic data and has made the dataset publicly available in both PCAP and CSV formats. The network traffic data is generated during two days. Training Day was on January 12th, 2018 and Testing Day was on March 11th, 2018.
- Categories:
It is a challenging work to solve the geometric attack in the field of digital watermarking. In order to solve the synchronization between the host image and the watermark, image normalization is introduced. Firstly, the geometrically invariant space of image is constructed by using image normalization, and a region of interest (ROI) is obtained from the normalized image by utilizing the invariant centroid theory. Then, the contourlet transform is performed on the ROI. Low-pass sub-band coefficients are divided into non-overlapping blocks.
- Categories:
The data set downloaded from Wikimedia Download is available as a test data set related to the key-value structure.Searchable encryption schemes that need to implement keyword search can use this dataset as test data.Wikimedia Commons is a media repository of free-to-use images, sounds, videos and other media.
- Categories:
Oblivion Results is a TXT dataset which contains the report files generated in the experimental phase of Oblivion's development. Knowing the SHA256 hash of a file of interest, if this file is present in our list, the relative report can be consulted.
The set is organized as follows:
- Categories:
This data collection focuses on capturing user-generated content from the popular social network Reddit during the year 2023. This dataset comprises 29 user-friendly CSV files collected from Reddit, containing textual data associated with various emotions and related concepts.
- Categories:
FormAI is a novel AI-generated dataset comprising 112,000 compilable and independent C programs. All the programs in the dataset were generated by GPT-3.5-turbo using dynamic zero-shot prompting technique and comprises programs with varying levels of complexity. Some programs handle complicated tasks such as network management, table games, or encryption, while others deal with simpler tasks like string manipulation. Each program is labelled based on vulnerabilities present in the code using a formal verification method based on the Efficient SMT-based Bounded Model Checker (ESBMC).
- Categories:
Smart homes contain programmable electronic devices (mostly IoT) that enable home automation. People who live in smart homes benefit from interconnected devices by controlling them either remotely or manually/autonomously. However, high interconnectivity comes with an increased attack surface, making the smart home an attractive target for adversaries. NCC Group and the Global Cyber Alliance recorded over 12,000 attacks to log into smart home devices maliciously. Recent statistics show that over 200 million smart homes can be subjected to these attacks.
- Categories:
- Categories: