eurecom-s3 / syscall2apiLinks
☆10Updated 4 years ago
Alternatives and similar repositories for syscall2api
Users that are interested in syscall2api are comparing it to the libraries listed below
Sorting:
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- ☆25Updated 6 years ago
- ☆44Updated 3 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆14Updated 7 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆51Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- DiAne is a smart fuzzer for IoT devices☆41Updated last year
- Awesome list for asm2vec☆17Updated 4 years ago
- ReDeBug Source Code.☆24Updated last year
- An Automated Vulnerability Detection System☆60Updated 8 years ago
- Codee☆17Updated 4 years ago
- Symbolic Execution of Android Framework☆15Updated 8 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆17Updated 7 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Updated 2 years ago
- ☆61Updated last year
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆26Updated 6 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago