yapengye / D-ARMView external linksLinks
☆26Aug 28, 2024Updated last year
Alternatives and similar repositories for D-ARM
Users that are interested in D-ARM are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2024Updated last year
- ☆86Nov 5, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- ☆15Dec 29, 2023Updated 2 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts☆21May 11, 2024Updated last year
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- ☆12Jul 8, 2023Updated 2 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- ☆17Aug 31, 2023Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- ☆13May 1, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- ☆39Jun 6, 2024Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆73Jul 25, 2024Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆20Oct 5, 2025Updated 4 months ago
- ☆40Feb 26, 2023Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- ☆19Oct 11, 2022Updated 3 years ago
- ☆25Mar 26, 2025Updated 10 months ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆42Apr 15, 2023Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Sep 14, 2024Updated last year
- This is the repository for OVRSeen, a system and framework to perform network traffic and privacy policy analyses on VR apps.☆19Oct 27, 2023Updated 2 years ago
- ☆20Feb 11, 2024Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- IDB parser☆22Nov 24, 2025Updated 2 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 8 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆28Jan 15, 2026Updated last month
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆36Jan 8, 2026Updated last month
- ☆21Apr 17, 2023Updated 2 years ago
- ☆27Jun 6, 2023Updated 2 years ago