yijiufly / SigmaDiff
Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"
☆16Updated last year
Alternatives and similar repositories for SigmaDiff:
Users that are interested in SigmaDiff are comparing it to the libraries listed below
- ☆29Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- ☆16Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- Full implementaion of Genius☆31Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆120Updated 2 years ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆28Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- ☆18Updated last year
- ☆60Updated last year
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆26Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆86Updated 2 months ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆45Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- ☆25Updated last year
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆48Updated 4 months ago
- GitHub Cloner & Compiler☆67Updated 3 years ago
- ☆29Updated 11 months ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- ☆74Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- ☆15Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- SeamFuzz Artifact repository for ICSE 2023☆13Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago