purseclab / D-helixLinks
a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.
☆17Updated last year
Alternatives and similar repositories for D-helix
Users that are interested in D-helix are comparing it to the libraries listed below
Sorting:
- ☆145Updated 10 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆109Updated 5 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 7 months ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆113Updated 9 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- ☆61Updated 3 weeks ago
- Symbolic Execution Over Processor Traces☆122Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆59Updated 2 months ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆36Updated 3 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆111Updated last month
- A Hybrid Alias Analysis☆19Updated 2 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- ☆18Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- BinTuner☆62Updated 3 years ago
- A data-flow-guided fuzzer☆123Updated 2 years ago
- ☆25Updated last year
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆22Updated 7 months ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆20Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆223Updated 2 months ago
- Recent symbolic execution papers and tools.☆174Updated 4 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- A versatile and easy-to-use static binary patching tool.☆41Updated last week
- AoT is a system for automatically generating off-target test harness by using build information.☆38Updated 9 months ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆31Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis☆83Updated 9 months ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Updated 3 years ago