Security

FormAI is a novel AI-generated dataset comprising 112,000 compilable and independent C programs. All the programs in the dataset were generated by GPT-3.5-turbo using dynamic zero-shot prompting technique and comprises programs with varying levels of complexity. Some programs handle complicated tasks such as network management, table games, or encryption, while others deal with simpler tasks like string manipulation. Each program is labelled based on vulnerabilities present in the code using a formal verification method based on the Efficient SMT-based Bounded Model Checker (ESBMC).

Categories:
1795 Views

Smart homes contain programmable electronic devices (mostly IoT) that enable home automation. People who live in smart homes benefit from interconnected devices by controlling them either remotely or manually/autonomously. However, high interconnectivity comes with an increased attack surface, making the smart home an attractive target for adversaries. NCC Group and the Global Cyber Alliance recorded over 12,000 attacks to log into smart home devices maliciously. Recent statistics show that over 200 million smart homes can be subjected to these attacks.

Categories:
3040 Views

Over 34,000 frames from 60 commercial-off-the-shelf ZigBee devices were collected in various scenarios including indoor/outdoor and line-of-sight/non-line-of-sight (LOS/NLOS). The ZigBee devices are hybrid, with 36 equipped with power amplifiers and the other 24 not. The ZigBee device uses the CC2530 chip, while the power amplifier is the RFX2401C chip. The signal frames in each scenario are placed in a separate folder, where all device numbers are fixed. Each frame reaches its maximum length, which includes 266 symbols.

Categories:
559 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
3545 Views

Translator   Translator   Translator   

Categories:
141 Views

In order to analyze the status of web domain certificates in the Web PKI, a relevant set of X.509 certificates must be built. This dataset was created based on the Alexa Top 1 Million (Top1M) List (available on 26 August 2021) and the Majestic Top 1 Million List (available on 21 November 2022) containing the most visited websites. We collected the X.509 certificates for the web domains in the Alexa Top1M list (file "ListAlexaFinal.txt") with two dedicated scripts in the dataset, namely "ScriptCollectCertificates.sh" and "StartScript_CollectCertificates.sh".

Categories:
219 Views

Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel’s coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implement the full SKG chain in four indoor experimental campaigns.

Categories:
457 Views

The high profitability of mining cryptocurrencies mining, a computationally intensive activity, forms a fertile ecosystem that is enticing not only legitimate investors but also cyber attackers who invest their illicit computational resources in this area. Cryptojacking refers to the surreptitious exploitation of a victim’s computing resources to mine cryptocurrencies on behalf of the cybercriminal. This malicious behavior is observed in executable files and browser executable codes, including JavaScript and Assembly modules, downloaded from websites to victims’ machines and executed.

Categories:
298 Views

Dataset I: This is the original EEG data of twelve healthy subjects for driver fatigue detection. Due to personal privacy, the digital number represents different participants. The .cnt files were created by a 40-channel Neuroscan amplifier, including the EEG data in two states in the process of driving.

Dataset II: This project adopted an event-related lane-departure paradigm in a virtual-reality (VR) dynamic driving simulator to quantitatively measure brain EEG dynamics along with the fluctuation of task performance throughout the experiment.

Categories:
2348 Views

Pages