XZ-X / PEM
☆15Updated last year
Alternatives and similar repositories for PEM
Users that are interested in PEM are comparing it to the libraries listed below
Sorting:
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 2 months ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆24Updated last year
- Seminar 2022☆21Updated last month
- ☆22Updated 8 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆23Updated 6 months ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- Code for tracelet-level symbolic execution☆18Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆18Updated last year
- ☆16Updated 8 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆59Updated this week
- ☆26Updated 7 months ago
- Lifting network implementation to precise format specification☆24Updated 3 weeks ago
- ☆17Updated 8 months ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- ☆99Updated 6 months ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- Binary Code Summarization☆10Updated last month
- ☆11Updated 10 months ago
- patch presence test via symbolic signatures, ICSE'24☆12Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Updated 8 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆45Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆37Updated 7 months ago
- ☆44Updated 2 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆12Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆14Updated 3 years ago