☆58Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for EKLAVYA
Users that are interested in EKLAVYA are comparing it to the libraries listed below
Sorting:
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- ☆61Dec 5, 2024Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆145Oct 26, 2024Updated last year
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆106Oct 23, 2024Updated last year
- A firewall application that leverages DPDK for performance and SGX for security.☆17Oct 10, 2019Updated 6 years ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- ☆26Oct 3, 2023Updated 2 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆183Sep 8, 2023Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆17Jun 21, 2025Updated 8 months ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- The Decompressoin tool for Vxworks MINIFS☆13May 18, 2021Updated 4 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- Tor anonymity network for SGX☆48Mar 4, 2019Updated 7 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆84Feb 26, 2026Updated last week
- ☆53Nov 26, 2017Updated 8 years ago
- ☆14Oct 24, 2023Updated 2 years ago
- Source-binary patch presence test system.☆84Jun 23, 2022Updated 3 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago