br0kej / FASERLinks
Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605
☆14Updated last year
Alternatives and similar repositories for FASER
Users that are interested in FASER are comparing it to the libraries listed below
Sorting:
- ☆24Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 3 years ago
- ☆10Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Pangine disassembly ground truth benchmark☆11Updated 4 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆90Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆42Updated 3 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- ☆28Updated last year
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- ☆38Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- ☆28Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- ☆63Updated last week
- suite of binaries used to test function identification☆29Updated 7 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- ☆12Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago