tudelft-cda-lab / FlexFringe
The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/2203.16331
☆18Updated 3 weeks ago
Alternatives and similar repositories for FlexFringe:
Users that are interested in FlexFringe are comparing it to the libraries listed below
- An evolutionary, coverage-guided greybox network protocol fuzzer☆19Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆37Updated last year
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆31Updated 4 years ago
- ☆8Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆11Updated 4 years ago
- Fuzz testing framework for binary programs using AI☆49Updated last year
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 3 years ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆21Updated 8 months ago
- OpenAI Gym environment for binary fuzzing based on afl☆21Updated 6 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- ☆12Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆84Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated 5 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated this week
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- An Automated Vulnerability Detection System☆58Updated 8 years ago
- ☆44Updated 2 years ago
- ☆47Updated 4 years ago
- Open-source code for RFCNLP paper.☆53Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- ☆16Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆44Updated 2 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- Protocol Inspection and State Machine Analysis☆24Updated 6 years ago