Net-GPT is a research artifact published at the 2023 IEEE/ACM Symposium on Edge Computing (SEC'23). The codebase demonstrates how Large Language Models can be fine-tuned to understand and generate network protocol packets, enabling a novel class of Man-in-the-Middle attacks against UAV communication systems.
This software is released exclusively for academic research, education, and authorized security testing.
- Academic research and reproducibility verification
- Authorized penetration testing in controlled lab environments
- Educational demonstrations in cybersecurity courses
- Development of defensive countermeasures and detection systems
- Any deployment against real aircraft or live airspace
- Any attack against networks, systems, or devices you do not own or have explicit written authorization to test
- Commercial exploitation for offensive purposes
- Any use that violates local, state, federal, or international law
- Any use targeting critical infrastructure or public safety systems
All experiments described in the paper and reproducible via this codebase were conducted under the following conditions:
| Safeguard | Implementation |
|---|---|
| UAV Platform | PX4 Software-In-The-Loop (SITL) simulation only |
| Network | Isolated lab network with no external connectivity |
| Airspace | No real airspace or physical flight operations involved |
| Data | Public network traffic datasets (Tcpreplay repository) |
| Hardware | ASUS GeForce RTX 4090 edge server (isolated) |
If you discover a security vulnerability in this codebase or a novel attack vector enabled by the techniques described in the paper, please report it responsibly:
- Do NOT open a public GitHub issue
- Email the research team at anyiliu@oakland.edu with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- We will acknowledge receipt within 48 hours and provide a response within 7 business days
THE SOFTWARE IS PROVIDED "AS IS" FOR ACADEMIC RESEARCH PURPOSES. THE AUTHORS AND OAKLAND UNIVERSITY ARE NOT RESPONSIBLE FOR ANY MISUSE, DAMAGE, OR ILLEGAL ACTIVITY RESULTING FROM THE USE OF THIS SOFTWARE. USERS ASSUME ALL RESPONSIBILITY FOR COMPLIANCE WITH APPLICABLE LAWS AND REGULATIONS.
By using this software, you agree to use it solely for lawful, authorized, and ethical purposes consistent with the responsible disclosure principles of the academic security research community.