purseclab / D-helix
a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.
☆14Updated 5 months ago
Alternatives and similar repositories for D-helix:
Users that are interested in D-helix are comparing it to the libraries listed below
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆31Updated last year
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- ☆141Updated 4 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆83Updated 2 months ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- ☆55Updated 2 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆57Updated last year
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- ☆50Updated 11 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆198Updated 3 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆106Updated 3 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆20Updated 5 months ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆85Updated last month
- ☆40Updated 2 weeks ago
- ☆34Updated last year
- ☆17Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆19Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆28Updated 8 months ago
- ☆37Updated 2 years ago
- ☆30Updated last month
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆59Updated 3 months ago
- Repository for monolithic firmware blobs☆71Updated 2 years ago
- A data-flow-guided fuzzer☆116Updated last year