NMHai / BE-PUM
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆19Updated 7 years ago
Alternatives and similar repositories for BE-PUM:
Users that are interested in BE-PUM are comparing it to the libraries listed below
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 5 months ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- ☆21Updated 5 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- suite of binaries used to test function identification☆28Updated 7 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- ☆43Updated 7 years ago
- ☆24Updated 2 years ago
- ☆31Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆53Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Vine: The BitBlaze Static Analysis Component☆25Updated 10 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆28Updated last year
- ☆13Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆55Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago