SoftSec-KAIST / BotScreenLinks
BotScreen: Trust Everybody, but Cut the Aimbots Yourself (USENIX Security '23)
☆13Updated last year
Alternatives and similar repositories for BotScreen
Users that are interested in BotScreen are comparing it to the libraries listed below
Sorting:
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆16Updated 3 weeks ago
- 2018s-IS521☆8Updated 7 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Updated last year
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- ☆144Updated 8 months ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- Recent symbolic execution papers and tools.☆169Updated 2 months ago
- Static Analysis Course☆73Updated this week
- ☆65Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 9 months ago
- UT based automated fuzz driver generation☆166Updated 3 months ago
- american fuzzy lop - a security-oriented fuzzer☆10Updated last year
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆31Updated 2 years ago
- ☆227Updated last year
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆202Updated 3 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆42Updated last year
- ☆289Updated 11 months ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last week
- ☆85Updated 8 months ago
- ☆53Updated last week
- Hopper is a tool for generating fuzzing test cases for libraries automatically using interpretative fuzzing.☆256Updated 3 weeks ago
- Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS Accepted).☆49Updated 2 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Updated 2 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 3 weeks ago
- ☆18Updated 3 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆41Updated last year
- ☆28Updated last year
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆16Updated 10 months ago