Learner0x5a / kTrans-release
Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding
☆20Updated 9 months ago
Related projects: ⓘ
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆35Updated 9 months ago
- This is the official repository for VulHawk.☆65Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆36Updated 11 months ago
- ☆89Updated 2 years ago
- ☆23Updated last year
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆30Updated 4 months ago
- Codee☆17Updated 3 years ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆33Updated 5 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆70Updated 3 weeks ago
- ☆30Updated 6 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆50Updated 10 months ago
- ☆56Updated 11 months ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆67Updated last year
- ☆43Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆12Updated 3 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 5 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- User Guided API Misuse Detection☆26Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆40Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- ☆48Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆56Updated 3 weeks ago
- ☆21Updated last year
- ☆15Updated 3 years ago
- GitHub Cloner & Compiler☆55Updated 2 years ago
- ☆30Updated 3 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆13Updated 5 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- ☆33Updated last year