mimicji / GAINSLinks
GAINS: Getting stArted wIth biNary analysiS
☆31Updated 3 years ago
Alternatives and similar repositories for GAINS
Users that are interested in GAINS are comparing it to the libraries listed below
Sorting:
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆44Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆41Updated last year
- This is the official repository for VulHawk.☆71Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- ☆51Updated 4 years ago
- ☆102Updated 9 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Codee☆17Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 9 months ago
- ☆50Updated 4 years ago
- ☆138Updated 7 years ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆28Updated last year
- ☆61Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- ☆25Updated 11 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 6 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆162Updated 4 months ago
- ☆61Updated 3 years ago
- ☆58Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated 3 weeks ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- BinTuner☆62Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆105Updated 6 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 3 years ago
- ☆29Updated 2 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆81Updated last year