br0kej / FASERLinks
Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605
☆13Updated last year
Alternatives and similar repositories for FASER
Users that are interested in FASER are comparing it to the libraries listed below
Sorting:
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 3 months ago
- ☆25Updated 2 years ago
- Symbolic Execution Over Processor Traces☆122Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Practical Data-Only Attack Generation☆41Updated last year
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- ☆56Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆109Updated 3 weeks ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- ☆61Updated last week
- ☆29Updated 2 years ago
- ☆144Updated 10 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆91Updated 3 years ago
- ☆38Updated 5 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last month
- ☆80Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- ☆25Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆29Updated last year
- ☆28Updated 2 years ago
- ☆16Updated 6 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆107Updated 4 months ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago