Icegrave0391 / Palantir
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22
☆18Updated 2 months ago
Alternatives and similar repositories for Palantir:
Users that are interested in Palantir are comparing it to the libraries listed below
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆49Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- Usenix Security'23☆13Updated last year
- A curated list of malware-related papers.☆23Updated 11 months ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆30Updated last year
- This is the official repository for VulHawk.☆68Updated last year
- The scalable bug search for binaries☆67Updated 8 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- ☆24Updated 4 months ago
- ☆37Updated last year
- This repository is used to analysis the shared resources of different containers☆28Updated 3 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Code for tracelet-level symbolic execution☆16Updated 2 years ago
- ☆60Updated 2 years ago
- Have fun with audit log analysis :)☆148Updated 8 months ago
- Offical Implementation for PalmTree☆139Updated last year
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆47Updated 8 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆151Updated 2 months ago
- ☆44Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- ☆74Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆90Updated 10 months ago