Kyle-Kyle / top4grepLinks
find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)
☆186Updated 10 months ago
Alternatives and similar repositories for top4grep
Users that are interested in top4grep are comparing it to the libraries listed below
Sorting:
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆99Updated 2 months ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆153Updated 4 months ago
- ☆226Updated last year
- ☆135Updated last year
- ☆73Updated last month
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 3 weeks ago
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆266Updated last year
- ☆65Updated last year
- A collection of resources/tools and analyses for the angr binary analysis framework.☆177Updated 2 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆343Updated last week
- Coverage-guided Fuzzing as Online Stochastic Control☆51Updated 7 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- ☆59Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆84Updated 6 months ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆93Updated 2 years ago
- ☆63Updated this week
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆168Updated 2 years ago
- UT based automated fuzz driver generation☆166Updated 2 months ago
- ☆64Updated last month
- PASTIS: Collaborative Fuzzing Framework☆162Updated last month
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆47Updated last year
- ☆72Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- Repository for monolithic firmware blobs☆79Updated 3 years ago
- ☆68Updated last year
- Run fuzzing experiments in Docker☆101Updated 4 years ago
- Recent symbolic execution papers and tools.☆167Updated last month
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆137Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 4 months ago