xiaojunxu / dnn-binary-code-similarity
☆135Updated 6 years ago
Alternatives and similar repositories for dnn-binary-code-similarity:
Users that are interested in dnn-binary-code-similarity are comparing it to the libraries listed below
- The scalable bug search for binaries☆68Updated 8 years ago
- ☆95Updated 4 months ago
- ☆60Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆103Updated 6 years ago
- Offical Implementation for PalmTree☆141Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆153Updated 3 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- An unofficial implementation of asm2vec as a standalone python package☆163Updated 4 years ago
- This is the official repository for VulHawk.☆68Updated last year
- Full implementaion of Genius☆31Updated last year
- ☆50Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆147Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆73Updated last year
- ☆274Updated 7 months ago
- ☆34Updated 2 years ago
- ☆44Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆64Updated 2 years ago
- Codee☆17Updated 4 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- ☆95Updated 4 months ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆79Updated last year
- ☆11Updated 2 years ago
- ☆22Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Updated 2 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- ☆49Updated 4 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆175Updated last year