clm07 / UniASMLinks
Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Updated 2 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below
Sorting:
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 6 months ago
- ☆96Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 5 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆115Updated last month
- ☆31Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- ☆81Updated 4 years ago
- ☆36Updated 2 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆118Updated 8 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 4 years ago
- ☆63Updated 2 years ago
- ☆98Updated 2 years ago
- CFG explorer for binaries☆84Updated last year
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆39Updated last month
- A tool for automatically identifying syscall-guard variables☆35Updated 7 months ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆60Updated 6 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Updated 2 years ago
- ☆76Updated 3 years ago
- An Automated Heap Feng Shui Tool☆18Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Automatic Exploit Generation Paper☆90Updated 4 years ago
- angr's exploration technique to perform taint analysis☆64Updated 5 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated last year
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆44Updated 2 years ago
- ☆46Updated 6 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago