br0kej / FASER
Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605
☆13Updated last year
Alternatives and similar repositories for FASER:
Users that are interested in FASER are comparing it to the libraries listed below
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆56Updated last year
- ☆23Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- ☆10Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- tool for multi-execution jump coverage introspection☆63Updated 2 months ago
- ☆28Updated last year
- ☆40Updated 2 years ago
- Material and examples for a presentation on static binary analysis.☆40Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 8 months ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆64Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆12Updated last week
- ☆20Updated 2 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆118Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆85Updated 3 years ago
- Pangine disassembly ground truth benchmark☆11Updated 3 years ago
- ☆24Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago
- ☆39Updated 3 years ago
- SAFE embeddings to match functions in yara☆100Updated 4 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆61Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated last week
- ☆38Updated 4 years ago