Jiadosi / FITLinks
☆15Updated 4 years ago
Alternatives and similar repositories for FIT
Users that are interested in FIT are comparing it to the libraries listed below
Sorting:
- Full implementaion of Genius☆31Updated 2 years ago
- ☆51Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 2 weeks ago
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆60Updated last year
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆18Updated last year
- ☆16Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆103Updated 6 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆55Updated 5 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- ☆28Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 5 years ago
- Codee☆17Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated 3 weeks ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 4 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- ☆44Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆76Updated 2 years ago
- ☆18Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- ☆77Updated 3 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 8 months ago
- ☆28Updated 2 years ago