Siyuan-Li201 / LibAM
the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》
☆25Updated 10 months ago
Alternatives and similar repositories for LibAM:
Users that are interested in LibAM are comparing it to the libraries listed below
- ☆50Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- ☆11Updated 2 years ago
- ☆41Updated last year
- ☆60Updated last year
- FirmSec Dataset☆33Updated 2 years ago
- Full implementaion of Genius☆31Updated last year
- Extracting the ACFG feature of each function from the binary file based on angr☆20Updated 6 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- Public version of CNEPS☆20Updated 2 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- ☆11Updated last year
- ☆34Updated 2 years ago
- 20 benchmark programs☆46Updated 4 years ago
- This is the official repository for VulHawk.☆68Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆66Updated 3 months ago
- ☆54Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆35Updated 5 months ago
- ☆68Updated 8 months ago
- ☆81Updated 10 months ago
- ☆12Updated this week
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆80Updated last year
- ☆274Updated 7 months ago
- The scalable bug search for binaries☆68Updated 8 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆75Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆147Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆42Updated 2 years ago
- ☆27Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago