SecPriv / iotflowLinks
☆13Updated last year
Alternatives and similar repositories for iotflow
Users that are interested in iotflow are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Updated last year
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 3 years ago
- Full implementaion of Genius☆31Updated 2 years ago
- ☆56Updated last year
- ☆44Updated 3 weeks ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- ☆26Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆78Updated 2 years ago
- ☆88Updated 2 months ago
- FirmSec Dataset☆34Updated 2 years ago
- ☆32Updated 3 weeks ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 6 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- ☆29Updated 2 years ago
- ☆35Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆17Updated last month
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆20Updated 2 weeks ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆94Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆95Updated last year
- ☆22Updated last year
- ☆34Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 5 months ago
- ☆18Updated 9 months ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 7 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago