the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》
☆29May 7, 2024Updated last year
Alternatives and similar repositories for LibAM
Users that are interested in LibAM are comparing it to the libraries listed below
Sorting:
- Public version of CNEPS☆24Dec 30, 2024Updated last year
- A C/C++ dependency scanner☆41Nov 24, 2023Updated 2 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 3 weeks ago
- ☆11Aug 24, 2023Updated 2 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆61Sep 2, 2019Updated 6 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Jan 23, 2018Updated 8 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 3 months ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- ☆62Jan 3, 2024Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆82Dec 10, 2024Updated last year
- ☆36Oct 12, 2022Updated 3 years ago
- ☆11Jul 25, 2023Updated 2 years ago
- ☆11Dec 4, 2024Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆41Dec 3, 2025Updated 3 months ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- ☆13Nov 12, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- ☆11Jan 2, 2023Updated 3 years ago
- [IEEE JBHI] The official code for "Automatic Segmentation of Hemorrhages in the Ultra-wide Field Retina: Multi-scale Attention Subtractio…☆15Feb 25, 2025Updated last year
- Framework for testing the reachability of native functions in Android applications.☆11Aug 30, 2023Updated 2 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- FirmSec Dataset☆46Oct 15, 2025Updated 4 months ago
- The rev.ng demos☆13Jan 29, 2026Updated last month
- ☆12Apr 23, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 4 months ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 10 months ago
- ARP攻击的原理与实现.☆11Apr 7, 2019Updated 6 years ago
- Unsupervized Error Logs Clusterization☆10Jun 17, 2024Updated last year
- Create HTML profiling reports from pandas DataFrame objects☆12May 19, 2020Updated 5 years ago
- ☆11Sep 28, 2022Updated 3 years ago
- ICSE'22 - Havoc-MAB: Enhancing AFL havoc mutation with Two-layer Multi-Armed Bandit☆12Sep 19, 2022Updated 3 years ago
- Anomaly Detector for ALeRCE broker 🤖☆11Nov 15, 2025Updated 3 months ago