☆43Jun 14, 2022Updated 3 years ago
Alternatives and similar repositories for deepvsa
Users that are interested in deepvsa are comparing it to the libraries listed below
Sorting:
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- ☆18Aug 7, 2020Updated 5 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆52Jan 19, 2016Updated 10 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- ☆55Nov 3, 2019Updated 6 years ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- neural network assisted fuzzer☆412May 24, 2020Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- Slicing tool for c++ programs using clang AST.☆18Mar 8, 2021Updated 4 years ago
- Tool for analyzing git log messages and diffs.☆22Jan 13, 2021Updated 5 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆252Mar 13, 2020Updated 5 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 3 months ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago