sys-ris3 / ML_Extraction_SokLinks
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
☆16Updated 7 months ago
Alternatives and similar repositories for ML_Extraction_Sok
Users that are interested in ML_Extraction_Sok are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- ☆24Updated 9 months ago
- ☆36Updated 2 years ago
- ☆61Updated 3 years ago
- ☆20Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆38Updated last year
- ☆57Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated last month
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Updated 2 years ago
- ☆25Updated 2 years ago
- ☆18Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 11 months ago
- The published code repo for the Cortex-M SoK paper.☆21Updated 6 months ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆40Updated 2 months ago
- ☆31Updated 6 months ago
- ViDeZZo source code.☆39Updated 8 months ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis☆83Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- ☆16Updated 4 years ago
- ☆43Updated 3 years ago
- ☆47Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- A tool for automatically identifying syscall-guard variables☆36Updated 7 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆116Updated 2 months ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆27Updated 2 months ago
- The scalable bug search for binaries☆70Updated 9 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Updated 6 years ago
- ☆30Updated 3 years ago
- ☆14Updated last year