☆58Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for EKLAVYA
Users that are interested in EKLAVYA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆60Dec 5, 2024Updated last year
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆146Oct 26, 2024Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆62Jul 6, 2025Updated 8 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- A firewall application that leverages DPDK for performance and SGX for security.☆17Oct 10, 2019Updated 6 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- ☆106Oct 23, 2024Updated last year
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆183Sep 8, 2023Updated 2 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆26Oct 3, 2023Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- AsusWRT RT-AX88U router GPL source code☆14Mar 6, 2020Updated 6 years ago
- ☆13May 27, 2019Updated 6 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago