Icegrave0391 / Palantir
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22
☆18Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Palantir
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- ☆23Updated 2 months ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆46Updated last year
- ☆11Updated 2 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆41Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆36Updated 11 months ago
- This is the official repository for VulHawk.☆65Updated last year
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆52Updated 2 weeks ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆46Updated 6 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆32Updated last month
- An standalone execution trace library built on DynamoRIO.☆21Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- The scalable bug search for binaries☆66Updated 7 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆27Updated last year
- ☆50Updated 3 years ago
- ☆58Updated 2 years ago
- ☆31Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated this week
- ☆44Updated 2 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆15Updated 11 months ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆68Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆85Updated 7 months ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆30Updated 9 months ago
- ☆33Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆39Updated 2 weeks ago