sefcom / TYGR
☆12Updated 5 months ago
Alternatives and similar repositories for TYGR:
Users that are interested in TYGR are comparing it to the libraries listed below
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated this week
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆13Updated 4 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆56Updated last year
- ☆29Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- ☆33Updated last year
- cinspector - a static C source code analysis framework☆26Updated 7 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- A data-flow-guided fuzzer☆111Updated last year
- Symbolic Execution Over Processor Traces☆119Updated 5 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆71Updated last month
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated 7 months ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- ☆20Updated 4 months ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆16Updated last year
- ☆21Updated 9 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆47Updated 8 months ago
- ☆31Updated 3 years ago
- ☆40Updated 2 years ago
- Recent symbolic execution papers and tools.☆150Updated 3 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆22Updated 10 months ago
- ☆27Updated last year
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- ☆13Updated 4 months ago