agwaBom / AsmDepictorLinks
Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing", In the 18th ACM Asia Conference on Computer and Communications Security AsiaCCS '2023
☆29Updated last year
Alternatives and similar repositories for AsmDepictor
Users that are interested in AsmDepictor are comparing it to the libraries listed below
Sorting:
- ☆63Updated 3 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 6 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆114Updated last month
- Symbolic Execution Over Processor Traces☆125Updated last year
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆116Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- 🦖 Reconstruct Types from Binary Code☆35Updated 2 weeks ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21Updated 3 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 5 months ago
- Binary Ninja plugin for forward/backward slicing☆18Updated 5 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆118Updated 8 months ago
- ☆46Updated 5 months ago
- Code snippets for Binary Ninja's Python API☆30Updated 4 years ago
- An IntelliJ IDEA plugin for working on Ghidra Extensions.☆105Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆121Updated 2 weeks ago
- ☆14Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆39Updated last month
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Updated 3 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆55Updated last year
- ☆45Updated 3 years ago
- ☆68Updated 6 months ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- ☆26Updated last year
- A data-flow-guided fuzzer☆124Updated 2 years ago
- ☆85Updated last year
- ☆39Updated 3 years ago
- The toolchain of Chosen-instruction attack☆20Updated 3 years ago
- ☆46Updated 4 years ago