ntt-zerolab / Xunpack
Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"
☆13Updated last year
Alternatives and similar repositories for Xunpack:
Users that are interested in Xunpack are comparing it to the libraries listed below
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- cross-architecture static library detector for IoT malware☆34Updated last year
- blackhat usa 2022 I attended☆72Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 2 months ago
- AFL/AFL++ version FishFuzz☆88Updated 9 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆43Updated 2 weeks ago
- (NDSS 2024) Optimizing Decompiler Output with LLM☆91Updated 4 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆54Updated 9 months ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆81Updated last year
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆59Updated last month
- This is the official repository for VulHawk.☆67Updated last year
- ☆16Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated last week
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆241Updated 2 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆17Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆70Updated last month
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆56Updated last year
- ☆19Updated 2 years ago
- Papers related with kernel papers☆13Updated last year
- ☆47Updated last year
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago