FirmSec Dataset
☆46Oct 15, 2025Updated 4 months ago
Alternatives and similar repositories for FirmSecDataset
Users that are interested in FirmSecDataset are comparing it to the libraries listed below
Sorting:
- Docker container with all extra tools installed to get the most out of binwalk☆20Dec 17, 2020Updated 5 years ago
- ☆65Jun 21, 2024Updated last year
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆17Jun 21, 2025Updated 8 months ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- ☆32Jul 22, 2023Updated 2 years ago
- Supplementary Material for XFL☆19Nov 30, 2025Updated 2 months ago
- ☆95May 4, 2025Updated 9 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆178Apr 10, 2025Updated 10 months ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- ☆11Mar 22, 2022Updated 3 years ago
- ☆308Jul 30, 2024Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- ☆29Dec 28, 2022Updated 3 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- ☆72Nov 1, 2023Updated 2 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- ☆16Sep 16, 2021Updated 4 years ago
- ☆20Aug 20, 2025Updated 6 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- ☆47May 27, 2023Updated 2 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- ☆23Jun 22, 2024Updated last year
- Code for tracelet-level symbolic execution☆18Sep 18, 2022Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 9 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- An awesome & curated list of binary code similarity papers☆597Jan 5, 2026Updated last month
- ☆239Jan 14, 2024Updated 2 years ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Mar 3, 2024Updated last year
- ☆18Aug 31, 2014Updated 11 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 6 years ago