Code for tracelet-level symbolic execution
☆18Sep 18, 2022Updated 3 years ago
Alternatives and similar repositories for sem2vec-SE
Users that are interested in sem2vec-SE are comparing it to the libraries listed below
Sorting:
- ☆12Jul 21, 2023Updated 2 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- Research Artifact For Our Submission To VLDB☆10Oct 27, 2021Updated 4 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- ☆11Mar 22, 2024Updated last year
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Dec 17, 2022Updated 3 years ago
- ☆15Sep 17, 2024Updated last year
- ☆10Sep 28, 2020Updated 5 years ago
- ☆12Jun 10, 2025Updated 9 months ago
- Implementation of MetaVQA.☆12Jul 3, 2021Updated 4 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- A test suite (a.k.a., dataset) with ~20k moral situations for understanding LLMs' behaviors.☆16May 5, 2023Updated 2 years ago
- ☆32Jan 26, 2025Updated last year
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆19Apr 9, 2019Updated 6 years ago
- Code for the paper "Explain Any Concept: Segment Anything Meets Concept-Based Explanation". Poster @ NeurIPS 2023☆46Dec 4, 2023Updated 2 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆41Dec 3, 2025Updated 3 months ago
- JavaScript Aware Web Archive Crawler (JAWA) (OSDI'22)☆13Dec 21, 2022Updated 3 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆180Apr 10, 2025Updated 11 months ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- ☆14Jan 24, 2024Updated 2 years ago
- [SDM'23] ML4C: Seeing Causality Through Latent Vicinity☆14Nov 9, 2022Updated 3 years ago
- An awesome & curated list of binary rewriting papers☆263Apr 4, 2022Updated 3 years ago
- FirmSec Dataset☆46Oct 15, 2025Updated 5 months ago
- A tool for testing SMT solvers for incompleteness bugs☆17Oct 12, 2022Updated 3 years ago
- ☆48Jun 16, 2025Updated 9 months ago
- ☆56Oct 22, 2020Updated 5 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- C rewrite of a minimal Python JPEG decoder☆12Jan 2, 2019Updated 7 years ago
- This document introduces how to implement a secure boot chain in UEFI using the TianoCore EDK II project☆12Apr 30, 2025Updated 10 months ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆200Mar 13, 2026Updated last week
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Nov 24, 2021Updated 4 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- BNG Image Format Implementation☆12Sep 19, 2020Updated 5 years ago
- A framework for testing compilers' type checkers☆19Updated this week