OSUSecLab / SymLMLinks
Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings"
☆58Updated last year
Alternatives and similar repositories for SymLM
Users that are interested in SymLM are comparing it to the libraries listed below
Sorting:
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- cinspector - a static C source code analysis framework☆26Updated last year
- Full implementaion of Genius☆31Updated 2 years ago
- This is the official repository for VulHawk.☆70Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆60Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 2 weeks ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆154Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆40Updated last year
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆23Updated this week
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- ☆24Updated 9 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆99Updated 2 months ago
- ☆46Updated last month
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 6 months ago
- ☆34Updated 2 years ago
- ☆85Updated 7 months ago
- ☆20Updated 3 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated last month
- A data-flow-guided fuzzer☆120Updated last year
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆17Updated last month
- ☆57Updated last year
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆18Updated last year
- ☆34Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago
- ☆27Updated 2 years ago
- ☆88Updated 2 months ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago