ZJUNESA / SANDPLinks
Seminar 2022
☆23Updated 3 weeks ago
Alternatives and similar repositories for SANDP
Users that are interested in SANDP are comparing it to the libraries listed below
Sorting:
- ☆31Updated last year
- A collection of security papers on top-tier publications☆61Updated last week
- ☆15Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- ☆11Updated last year
- A curated list of malware-related papers.☆34Updated last year
- Binary Code Summarization☆14Updated 10 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24Updated 8 months ago
- the instructions about request access to AdvDroidZero☆13Updated last year
- ☆21Updated last year
- ☆43Updated 5 months ago
- TensorFlow API analysis tool and malicious model detection tool☆39Updated 8 months ago
- ☆32Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- adversarial malware detection via a principled way☆24Updated 2 years ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Updated last week
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆52Updated 7 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56Updated last year
- This is the official repository for VulHawk.☆74Updated 2 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Updated 10 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Updated 8 months ago
- ☆127Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆176Updated 9 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 9 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 5 years ago