Siyuan-Li201 / LibAM
the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》
☆23Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for LibAM
- Public version of CNEPS☆18Updated 10 months ago
- ☆50Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆134Updated 11 months ago
- Full implementaion of Genius☆30Updated last year
- FirmSec Dataset☆30Updated 2 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆68Updated last year
- ☆11Updated 2 years ago
- ☆33Updated 2 years ago
- ☆36Updated 8 months ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆18Updated 5 years ago
- 20 benchmark programs☆45Updated 3 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- ☆23Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆27Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 6 years ago
- ☆51Updated 10 months ago
- This is the official repository for VulHawk.☆65Updated last year
- ☆60Updated last year
- The dataset used in the experiments for Esh (http://binsim.com)☆20Updated 8 years ago
- ☆11Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆102Updated 5 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆40Updated 2 years ago
- The scalable bug search for binaries☆66Updated 7 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- Recent Fuzzing Paper☆15Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆34Updated 5 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆137Updated last week
- ☆68Updated 4 months ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆75Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆47Updated 2 months ago