There are no reviews yet. Be the first to send feedback to the community and the maintainers!
macke
Modular And Compositional analysis with KLEE Engineobfuscation-benchmarks
A set of programs used for benchmarking the strength of obfuscationindistinguishability-obfuscation
Implementation of indistinguishability obfuscation constructions from scientific literaturevot4cs
A Virtualization Obfuscation Tool for C# programsmunch
Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programsattack-graph-generator
klee-install
Step by step manual for building KLEEdta-vs-osc
Dynamic Taint Analysis versus Obfuscated Self-CheckingRepackman
A Tool for the Automatic Repackaging of Android Appsdeadlines
Deadline countdowns for academic conferences relevant to the SSE chair.Oedipus
A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.self-checksumming
sip-toolchain
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGXsip-oblivious-hashing
JTeC
JTeC: Java Testwise Coverageinput-dependency-analyzer
dirts
DIRTS: Dependency Injection Aware Regression Test SelectionMaat
Maat is a framework that mines VirusTotal scan reports to extract various information about the correctness, completeness, and consistency of scanners. It can also be used to train threshold-based and ML-based labeling strategies to label (Android) apps according to their VirusTotal scan reports and much more. Maat also refers to the ancient Egyptian concepts of truth, balance, order, harmony.nequivack
Non-equivalence checker for C programsbinary-rts
BinaryRTS is a research tool for regression test selection of C++ binaries based on dynamic binary instrumentationAletheia
macke-opt-llvm
Passes for LLVM operations inside MACKECIS-Benchmark-Evaluation
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.inverse-transparency
Connected infrastructure to automatically log and display accesses to employees' datamacke-fuzzer-opt-llvm
green-fuzzing-artifacts
Artifacts for the paper: "Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction"what-the-func
A simple C++ function parser/tagger based on tree-sitterrritbed
Real-Time Remote Intrusion Detection Testbedlocalizing-android-malicious-behaviors
Initial implementation of a method to localize malicious behaviors from API call traces of Android appsSACPS-evaluation-framework
disa-windows-server-2016
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.ssacps_packages
Contains ROS packages to run the use cases in the ssacps_simulation repository.troutcatchers
A framework for the extraction of malicious behaviors from Android (repackaged) malwarekovacs
sipvsml
Software Integrity Protection Versus Machine LearningCodeMapExtractor
survey-tools
A bunch of text and pdf analysis tools that may be useful for literature surveys and mapping studiesMakeAdditions
Add magic to your make commanddisa-windows-server-2019
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.Better-Safe-Than-Sorry
This repository is part of the paper "Better Safe Than Sorry! Automated Identification of Breaking Security-Configuration Rules" accepted at the "4th ACM/IEEE International Conference on Automation of Software Test (AST)". https://conf.researchr.org/home/ast-2023CODASPY2022
This repository is part of the paper "Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations" presented at the 12th ACM Conference on Data and Application Security and Privacy (CODASPY). http://www.codaspy.org/2022/Automated-Identification-of-Security-Relevant-Configuration-Settings-Using-NLP
This repository is part of the paper "Automated Identification of Security-Relevant Configuration Settings Using NLP" accepted at the Industry Showcase track at the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). https://conf.researchr.org/track/ase-2022/ase-2022-industry-showcase.Love Open Source and this site? Check out how you can help us