sslab-gatech / desensitizationLinks
☆11Updated 5 years ago
Alternatives and similar repositories for desensitization
Users that are interested in desensitization are comparing it to the libraries listed below
Sorting:
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- ☆11Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- ☆25Updated 6 years ago
- ☆10Updated 4 years ago
- ☆44Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- ☆12Updated 4 years ago
- ☆31Updated 3 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆14Updated 6 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- An Automated Vulnerability Detection System☆60Updated 9 years ago
- ☆10Updated 5 years ago
- ☆25Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- experiments for IJON☆12Updated 6 years ago
- Human-In-The-Loop Automatic Program Repair☆19Updated 5 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆64Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Updated 6 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- Awesome list for asm2vec☆17Updated 4 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆12Updated 3 years ago
- An Automated Heap Feng Shui Tool☆17Updated 3 years ago