nimrodpar / esh-dataset-1523Links
The dataset used in the experiments for Esh (http://binsim.com)
☆21Updated 9 years ago
Alternatives and similar repositories for esh-dataset-1523
Users that are interested in esh-dataset-1523 are comparing it to the libraries listed below
Sorting:
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 7 years ago
- ☆139Updated 7 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Updated 2 years ago
- ☆22Updated 2 years ago
- ☆50Updated 5 years ago
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 4 years ago
- ☆58Updated 4 years ago
- ☆56Updated 5 years ago
- ☆36Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆107Updated 7 years ago
- ☆105Updated last year
- Offical Implementation for PalmTree☆146Updated last year
- SAFE: Self-Attentive Function Embeddings for binary similarity☆180Updated 2 years ago
- ☆63Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆169Updated 2 years ago
- ☆43Updated 3 years ago
- ☆306Updated last year
- The scalable bug search for binaries☆70Updated 9 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- Full implementaion of Genius☆33Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- ☆15Updated 4 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- User Guided API Misuse Detection☆30Updated 3 years ago
- This is the official repository for VulHawk.☆74Updated 2 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆84Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- Recent Paper About Bug Detection☆31Updated 6 years ago
- 20 benchmark programs☆51Updated 4 years ago