clm07 / UniASMLinks
Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Updated 2 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below
Sorting:
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 4 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- ☆30Updated 2 years ago
- ☆96Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 5 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆116Updated 7 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Updated 2 years ago
- ☆81Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Updated 3 years ago
- ☆62Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆60Updated 6 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Updated last year
- cinspector - a static C source code analysis framework☆28Updated last year
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆38Updated 3 weeks ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆30Updated 2 years ago
- Directed fuzzing framework for gVisor.☆26Updated 2 years ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆47Updated 2 years ago
- Automatic Exploit Generation Paper☆89Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- This is the official repository for VulHawk.☆73Updated 2 years ago
- Symbolic Execution Over Processor Traces☆124Updated last year
- Coverage-guided Fuzzing as Online Stochastic Control☆55Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated 3 weeks ago
- ☆36Updated 2 years ago
- ☆43Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Updated 3 years ago
- ☆45Updated 5 months ago
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 4 years ago