☆43Jun 14, 2022Updated 3 years ago
Alternatives and similar repositories for deepvsa
Users that are interested in deepvsa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- ☆13Feb 22, 2022Updated 4 years ago
- ☆21Jan 17, 2022Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆62Jul 6, 2025Updated 8 months ago
- ☆55Nov 3, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- ☆26Mar 24, 2023Updated 3 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- We hinder fuzzing☆68Dec 27, 2021Updated 4 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- neural network assisted fuzzer☆413May 24, 2020Updated 5 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- Corpora used to seed NSS' fuzzing targets☆10Mar 15, 2026Updated last week
- ☆252Mar 13, 2020Updated 6 years ago
- ☆57Oct 15, 2020Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- ☆13Nov 14, 2023Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- ☆18Aug 7, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 2 years ago