agwaBom / AsmDepictor
Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing", In the 18th ACM Asia Conference on Computer and Communications Security AsiaCCS '2023
☆28Updated 11 months ago
Alternatives and similar repositories for AsmDepictor:
Users that are interested in AsmDepictor are comparing it to the libraries listed below
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆86Updated 2 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆120Updated 2 years ago
- ☆28Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆86Updated 3 months ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆57Updated last year
- ☆56Updated 3 months ago
- Pangine disassembly ground truth benchmark☆11Updated 4 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- ☆24Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Symbolic Execution Over Processor Traces☆120Updated 7 months ago
- ☆10Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- ☆62Updated last week
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆16Updated last year
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated last year
- ☆74Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- Scalable Validator for Binary Lifters☆55Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- ☆24Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 4 months ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆107Updated 4 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated 2 months ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Updated last year