sys-ris3 / ML_Extraction_SokLinks
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
☆12Updated last month
Alternatives and similar repositories for ML_Extraction_Sok
Users that are interested in ML_Extraction_Sok are comparing it to the libraries listed below
Sorting:
- ☆23Updated 9 months ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆34Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 3 weeks ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆40Updated last year
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 5 months ago
- ☆34Updated 2 years ago
- ☆24Updated 9 months ago
- ☆34Updated 4 years ago
- An Automated Heap Feng Shui Tool☆16Updated 3 years ago
- ☆36Updated last year
- ☆27Updated 3 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- ☆41Updated 2 weeks ago
- ☆16Updated 7 months ago
- ☆55Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- ☆61Updated 3 years ago
- ☆13Updated last year
- ☆44Updated 3 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆34Updated last year
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆23Updated this week
- The released code of FuzzGuard in USENIX Security 2020.☆30Updated 5 years ago
- ☆24Updated last year
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- ☆46Updated 3 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago