br0kej / FASER
Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605
☆14Updated last year
Alternatives and similar repositories for FASER
Users that are interested in FASER are comparing it to the libraries listed below
Sorting:
- ☆24Updated 2 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- ☆42Updated 3 years ago
- ☆26Updated 2 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 3 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last week
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 3 years ago
- AIL: The angr Intermediate Language.☆32Updated this week
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- ☆10Updated 5 years ago
- tool for multi-execution jump coverage introspection☆64Updated 3 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆28Updated last year
- ☆37Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 3 years ago
- ☆12Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆90Updated 3 years ago
- ☆20Updated 3 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆55Updated 3 years ago