Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"
☆29Jul 29, 2022Updated 3 years ago
Alternatives and similar repositories for ir_lifting_data
Users that are interested in ir_lifting_data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 21, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Research Artifact For Our Submission To VLDB☆10Oct 27, 2021Updated 4 years ago
- ☆11Mar 22, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆16Sep 5, 2023Updated 2 years ago
- Code for tracelet-level symbolic execution☆18Sep 18, 2022Updated 3 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Dec 17, 2022Updated 3 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆200Mar 13, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of MetaVQA.☆12Jul 3, 2021Updated 4 years ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Nov 24, 2021Updated 4 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆41Dec 3, 2025Updated 3 months ago
- ☆15Sep 17, 2024Updated last year
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated 11 months ago
- A test suite (a.k.a., dataset) with ~20k moral situations for understanding LLMs' behaviors.☆16May 5, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Rust Bindings to interact with SMTLIB2 compliant solvers☆17Jun 3, 2019Updated 6 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Mar 10, 2025Updated last year
- Code for the paper "Explain Any Concept: Segment Anything Meets Concept-Based Explanation". Poster @ NeurIPS 2023☆46Dec 4, 2023Updated 2 years ago
- ☆87Nov 5, 2024Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Java Ranger is a path-merging extension of Symbolic PathFinder☆15Mar 16, 2026Updated 2 weeks ago
- ☆146Oct 26, 2024Updated last year
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Apr 4, 2024Updated last year
- BinTuner☆67Jul 25, 2022Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- ☆13Jun 10, 2025Updated 9 months ago
- Symbolic Execution over Falcon IL☆30Mar 13, 2026Updated 2 weeks ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago