yapengye / D-ARM
☆20Updated 5 months ago
Alternatives and similar repositories for D-ARM:
Users that are interested in D-ARM are comparing it to the libraries listed below
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- ☆44Updated 2 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆33Updated 4 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 2 weeks ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆90Updated 10 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆48Updated 8 months ago
- ☆31Updated 3 years ago
- This is the official repository for VulHawk.☆68Updated last year
- ☆47Updated 4 years ago
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- ☆39Updated 11 months ago
- ☆95Updated 3 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 11 months ago
- ☆8Updated 2 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆28Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆82Updated 3 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆92Updated last year
- ☆29Updated last year
- Recent Paper About Bug Detection☆30Updated 5 years ago
- ☆46Updated 3 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- Lifting network implementation to precise format specification☆23Updated 3 months ago
- ☆26Updated last year
- 20 benchmark programs☆46Updated 3 years ago
- ☆72Updated 3 years ago