yapengye / D-ARM
☆22Updated 8 months ago
Alternatives and similar repositories for D-ARM:
Users that are interested in D-ARM are comparing it to the libraries listed below
- ☆44Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 3 months ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- ☆34Updated 4 years ago
- Full implementaion of Genius☆31Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆10Updated 11 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆37Updated 7 months ago
- ☆69Updated 10 months ago
- 20 benchmark programs☆47Updated 4 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 5 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- ☆84Updated 6 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆93Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆53Updated 2 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆44Updated last year
- ☆43Updated 2 weeks ago
- ☆33Updated last year
- ☆46Updated 3 years ago