firmcode / instruction2vec
Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN
☆36Updated last year
Alternatives and similar repositories for instruction2vec:
Users that are interested in instruction2vec are comparing it to the libraries listed below
- An unofficial implementation of asm2vec as a standalone python package☆161Updated 3 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆77Updated last year
- ☆60Updated last year
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆118Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆141Updated last year
- ☆44Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 2 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆85Updated 8 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated last week
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 7 months ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- A data-flow-guided fuzzer☆111Updated last year
- ☆24Updated 5 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆53Updated 5 years ago
- Full implementaion of Genius☆31Updated last year
- ☆56Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- Source code of MEUZZ fuzzer☆44Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆40Updated 3 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆72Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆175Updated last year
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆153Updated 2 years ago