yuedeji / c_func_name_extract
Extract Function Name in C/C++ Source Codes
☆25Updated 7 years ago
Alternatives and similar repositories for c_func_name_extract:
Users that are interested in c_func_name_extract are comparing it to the libraries listed below
- llvm control flow graph☆26Updated 5 years ago
- ☆24Updated 2 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- ☆34Updated 2 years ago
- Slicing tool for c++ programs using clang AST.☆17Updated 3 years ago
- ☆76Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆118Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated 3 weeks ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆21Updated 9 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆10Updated last year
- Full implementaion of Genius☆31Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆60Updated last year
- ☆44Updated 2 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Updated 6 years ago
- UAF Fuzzing Benchmark☆57Updated 3 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆33Updated 4 months ago
- ☆31Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆141Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- ☆44Updated 4 years ago
- ☆60Updated last year
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- ☆71Updated 3 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- Code for PathAFL on ASIACCS 2020. Please see README_CN.md. Please wait for README_EN.md.☆17Updated 4 years ago
- ☆51Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated this week