NMHai / BE-PUM
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆19Updated 7 years ago
Alternatives and similar repositories for BE-PUM:
Users that are interested in BE-PUM are comparing it to the libraries listed below
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 4 months ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- ☆40Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Build your emulation environment as needed☆65Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆79Updated 6 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆26Updated last year
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- ☆24Updated 2 years ago
- ☆18Updated 3 years ago
- Using LibVMI to detect malware☆31Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- ☆53Updated 5 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆26Updated 11 years ago
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- suite of binaries used to test function identification☆28Updated 7 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- First level taint implementation with qemu for linux user mode☆27Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago