SoftSec-KAIST / ReassessorLinks
Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)
☆34Updated 11 months ago
Alternatives and similar repositories for Reassessor
Users that are interested in Reassessor are comparing it to the libraries listed below
Sorting:
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- ☆36Updated 2 years ago
- ☆39Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Updated 3 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Updated 2 years ago
- ☆86Updated last year
- ☆43Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- ☆42Updated 3 years ago
- ☆26Updated last year
- BinTuner☆64Updated 3 years ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago
- Source code of MEUZZ fuzzer☆46Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- Implementation of QFuzz.☆17Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated last month
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- ☆14Updated 8 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- ☆144Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆43Updated 6 months ago
- ☆17Updated 6 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆87Updated 3 months ago