AISE-TUDelft / Capybara-BinT5View external linksLinks
Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"
☆17Jul 8, 2024Updated last year
Alternatives and similar repositories for Capybara-BinT5
Users that are interested in Capybara-BinT5 are comparing it to the libraries listed below
Sorting:
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Aug 4, 2022Updated 3 years ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- ☆14Oct 24, 2023Updated 2 years ago
- Binary Code Summarization☆14Apr 3, 2025Updated 10 months ago
- Supplementary Material for XFL☆19Nov 30, 2025Updated 2 months ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- ☆31Jul 22, 2023Updated 2 years ago
- This is a **reimplementation** of the ICLR 2019 paper "Graph Matching Networks for Learning the Similarity of Graph Structured Objects" (…☆23Nov 24, 2020Updated 5 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- Exploring and improving the quality of ChatGPT-generated code for LeetCode programming tasks.☆11Jan 19, 2024Updated 2 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Offical Implementation for PalmTree☆147Jan 29, 2024Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆171Dec 15, 2023Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Jan 28, 2026Updated 2 weeks ago
- Replication package of the ICSE2025 paper titled "Leveraging Large Language Models for Enhancing the Understandability of Generated Unit …☆11Feb 19, 2025Updated 11 months ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- MIPS I simulator☆20Dec 28, 2018Updated 7 years ago
- Explanation Optimization☆13Oct 16, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Implementation of NRMS "Neural News Recommendation with Multi-Head Self-Attention" (EMNLP2019), in Pytorch☆10Jan 20, 2021Updated 5 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- ☆106Oct 23, 2024Updated last year
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆182Sep 8, 2023Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Oct 18, 2025Updated 3 months ago
- FirmSec Dataset☆46Oct 15, 2025Updated 4 months ago
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 10 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆12Apr 9, 2022Updated 3 years ago
- No description yet☆11May 26, 2023Updated 2 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago