GAINS: Getting stArted wIth biNary analysiS
☆31Feb 23, 2022Updated 4 years ago
Alternatives and similar repositories for GAINS
Users that are interested in GAINS are comparing it to the libraries listed below
Sorting:
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆18Jun 4, 2024Updated last year
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆40Oct 31, 2022Updated 3 years ago
- ☆11May 3, 2019Updated 6 years ago
- Have fun with audit log analysis :)☆154May 5, 2024Updated last year
- ☆27Dec 10, 2021Updated 4 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆59Mar 27, 2023Updated 2 years ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆12Dec 5, 2024Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- ☆86Feb 24, 2025Updated last year
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆23Jun 20, 2025Updated 8 months ago
- Diagnose performance issues in macOS based on mac_tracing.☆19May 16, 2021Updated 4 years ago
- For NUS PhD Students and Staffs, just one click to open the research papers on Google Scholar/IEEE/ACM, etc. with this script.☆25Jul 11, 2024Updated last year
- ☆20Oct 31, 2020Updated 5 years ago
- revised☆22Jul 26, 2020Updated 5 years ago
- ☆21Aug 25, 2024Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆67Mar 25, 2025Updated 11 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- Real firmware fuzz-tested in P2IM paper☆24Dec 11, 2020Updated 5 years ago
- ☆71Oct 25, 2024Updated last year
- ☆26Dec 17, 2021Updated 4 years ago
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆38Jul 3, 2023Updated 2 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- Java decompilation & deobfuscation lab - dockerized toolset☆15Feb 15, 2026Updated 2 weeks ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- ☆10Sep 28, 2020Updated 5 years ago