tudelft-cda-lab / FlexFringe
The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/2203.16331
☆19Updated 3 weeks ago
Alternatives and similar repositories for FlexFringe:
Users that are interested in FlexFringe are comparing it to the libraries listed below
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A Quick Research of Active Automata Learning☆27Updated 5 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆19Updated 3 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆32Updated last year
- ☆30Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆80Updated this week
- ☆95Updated 5 months ago
- Protocol state machine learner and fuzzer for DTLS servers and clients☆37Updated this week
- ☆39Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆61Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- ☆8Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆55Updated last year
- This is the official repository for VulHawk.☆69Updated 2 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Fuzz testing framework for binary programs using AI☆50Updated last year
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 3 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆21Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆20Updated 4 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- ☆12Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year