Code and artifacts related to the Asia CCS 2022 paper
☆38Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for SAST_on_Decompilers
Users that are interested in SAST_on_Decompilers are comparing it to the libraries listed below
Sorting:
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆39Nov 27, 2024Updated last year
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆39Jun 6, 2024Updated last year
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- ☆71Oct 25, 2024Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- ☆22Sep 28, 2022Updated 3 years ago
- An awesome & curated list of binary code similarity papers☆597Jan 5, 2026Updated last month
- Fuzzing Parsers with Tokens☆33Jan 14, 2021Updated 5 years ago
- ☆19Aug 30, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated 3 weeks ago
- ☆19Dec 9, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- ☆37May 11, 2022Updated 3 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- headless-ida-mcp-server☆30Apr 4, 2025Updated 10 months ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆31May 16, 2023Updated 2 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆231Jun 9, 2020Updated 5 years ago
- ☆26Aug 28, 2024Updated last year
- Syzkaller with MAB scheduling and seed selection☆27Jan 29, 2020Updated 6 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago