SoftSec-KAIST / BotScreenLinks
BotScreen: Trust Everybody, but Cut the Aimbots Yourself (USENIX Security '23)
☆13Updated 2 years ago
Alternatives and similar repositories for BotScreen
Users that are interested in BotScreen are comparing it to the libraries listed below
Sorting:
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆16Updated 2 months ago
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 9 months ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 11 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆81Updated last year
- ☆66Updated last year
- ☆144Updated 10 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Symbolic Execution Over Processor Traces☆122Updated last year
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆31Updated 2 years ago
- Recent symbolic execution papers and tools.☆171Updated 3 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 2 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 7 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Updated 3 years ago
- ☆70Updated last year
- ☆55Updated this week
- ☆46Updated 3 years ago
- UT based automated fuzz driver generation☆167Updated 4 months ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆14Updated 3 months ago
- ☆42Updated 2 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 6 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆109Updated 3 weeks ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆107Updated 4 months ago
- A data-flow-guided fuzzer☆122Updated 2 years ago
- The Art, Science, and Engineering of Fuzzing: A Survey☆223Updated 3 weeks ago