purseclab / D-helix
a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.
☆15Updated 7 months ago
Alternatives and similar repositories for D-helix:
Users that are interested in D-helix are comparing it to the libraries listed below
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆91Updated last week
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- ☆34Updated last year
- A data-flow-guided fuzzer☆119Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆87Updated 3 months ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- ☆143Updated 5 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆57Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 2 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆32Updated 2 months ago
- angr's exploration technique to perform taint analysis☆60Updated 5 years ago
- ☆14Updated 7 months ago
- ☆25Updated last year
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆16Updated last year
- ☆65Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆16Updated last month
- ☆52Updated 11 months ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆16Updated 5 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆74Updated 2 years ago
- ☆53Updated last year
- ☆69Updated 9 months ago
- ☆22Updated 7 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated 10 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆59Updated 4 months ago
- ☆34Updated 4 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆154Updated 2 years ago