ycachy / Codee
Codee
☆17Updated 3 years ago
Related projects: ⓘ
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 5 years ago
- ☆56Updated 11 months ago
- Full implementaion of Genius☆30Updated last year
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆67Updated last year
- The scalable bug search for binaries☆66Updated 7 years ago
- ☆33Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆100Updated 5 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- ☆15Updated 3 years ago
- This is the official repository for VulHawk.☆65Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆20Updated 9 months ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆13Updated 5 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆73Updated 10 months ago
- ☆23Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆35Updated 9 months ago
- ☆43Updated 2 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- ☆22Updated last year
- ☆48Updated 3 years ago
- Code for PathAFL on ASIACCS 2020. Please see README_CN.md. Please wait for README_EN.md.☆16Updated 3 years ago
- Recent Paper About Bug Detection☆29Updated 4 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆56Updated 3 weeks ago
- ☆30Updated 6 months ago
- ☆89Updated 2 years ago
- ☆50Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆40Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆50Updated 10 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆38Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆12Updated 3 years ago