Ch3nYe / FoCLinks
FoC
☆15Updated 2 months ago
Alternatives and similar repositories for FoC
Users that are interested in FoC are comparing it to the libraries listed below
Sorting:
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆72Updated 9 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆45Updated 4 months ago
- ☆22Updated 9 months ago
- ☆50Updated 4 months ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆66Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆165Updated 5 months ago
- This is the official repository for VulHawk.☆72Updated 2 years ago
- Binary Code Summarization☆11Updated 5 months ago
- FirmSec Dataset☆11Updated 4 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆72Updated 10 months ago
- ☆90Updated 5 months ago
- ☆64Updated last year
- FirmSec Dataset☆40Updated 3 years ago
- ☆20Updated last year
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- ☆11Updated 2 months ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- ☆12Updated 2 years ago
- Full implementaion of Genius☆32Updated 2 years ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆31Updated last year
- (NDSS 2024) Optimizing Decompiler Output with LLM☆122Updated last year
- ☆298Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆60Updated 2 months ago
- ☆30Updated 2 years ago
- Source code for LLMxCPG paper☆48Updated 3 weeks ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆14Updated 6 months ago
- Supplementary Material for XFL☆19Updated last week
- ☆21Updated last year
- ☆14Updated last month