☆61Dec 5, 2024Updated last year
Alternatives and similar repositories for stateformer
Users that are interested in stateformer are comparing it to the libraries listed below
Sorting:
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- ☆106Oct 23, 2024Updated last year
- Code for paper "Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers"☆17Jan 27, 2023Updated 3 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 8 months ago
- ☆86Nov 5, 2024Updated last year
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 2 years ago
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- Benchmarks for the VNN Comp 2023☆16Jun 7, 2024Updated last year
- ☆13Sep 25, 2023Updated 2 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- Personal curation of Clang/LLVM patches.☆12Feb 27, 2021Updated 5 years ago
- Supplementary Material for XFL☆20Nov 30, 2025Updated 3 months ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆183Sep 8, 2023Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆17Aug 2, 2022Updated 3 years ago
- ☆13Dec 27, 2019Updated 6 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆30Jul 7, 2021Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆122Feb 25, 2026Updated 3 weeks ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- Code and resources for the paper: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs"☆211May 10, 2021Updated 4 years ago
- ☆145Oct 26, 2024Updated last year
- ☆75Jan 14, 2024Updated 2 years ago
- Minidump loader for Binary Ninja☆15Sep 25, 2025Updated 5 months ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- Reference implementations for RecurJac, CROWN, FastLin and FastLip (Neural Network verification and robustness certification algorithms)…☆27Nov 23, 2019Updated 6 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago