There are no reviews yet. Be the first to send feedback to the community and the maintainers!
macke
Modular And Compositional analysis with KLEE Engineobfuscation-benchmarks
A set of programs used for benchmarking the strength of obfuscationindistinguishability-obfuscation
Implementation of indistinguishability obfuscation constructions from scientific literaturevot4cs
A Virtualization Obfuscation Tool for C# programsmunch
Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programsattack-graph-generator
klee-install
Step by step manual for building KLEEdta-vs-osc
Dynamic Taint Analysis versus Obfuscated Self-CheckingRepackman
A Tool for the Automatic Repackaging of Android Appsdeadlines
Deadline countdowns for academic conferences relevant to the SSE chair.Oedipus
A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.self-checksumming
sip-toolchain
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGXsip-oblivious-hashing
JTeC
JTeC: Java Testwise Coverageinput-dependency-analyzer
dirts
DIRTS: Dependency Injection Aware Regression Test SelectionMaat
Maat is a framework that mines VirusTotal scan reports to extract various information about the correctness, completeness, and consistency of scanners. It can also be used to train threshold-based and ML-based labeling strategies to label (Android) apps according to their VirusTotal scan reports and much more. Maat also refers to the ancient Egyptian concepts of truth, balance, order, harmony.Pairika
nequivack
Non-equivalence checker for C programsbinary-rts
BinaryRTS is a research tool for regression test selection of C++ binaries based on dynamic binary instrumentationAletheia
macke-opt-llvm
Passes for LLVM operations inside MACKECIS-Benchmark-Evaluation
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.inverse-transparency
Connected infrastructure to automatically log and display accesses to employees' datamacke-fuzzer-opt-llvm
green-fuzzing-artifacts
Artifacts for the paper: "Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction"what-the-func
A simple C++ function parser/tagger based on tree-sitterrritbed
Real-Time Remote Intrusion Detection Testbedlocalizing-android-malicious-behaviors
Initial implementation of a method to localize malicious behaviors from API call traces of Android appsSACPS-evaluation-framework
disa-windows-server-2016
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.ssacps_packages
Contains ROS packages to run the use cases in the ssacps_simulation repository.troutcatchers
A framework for the extraction of malicious behaviors from Android (repackaged) malwaresipvsml
Software Integrity Protection Versus Machine LearningCodeMapExtractor
survey-tools
A bunch of text and pdf analysis tools that may be useful for literature surveys and mapping studiesMakeAdditions
Add magic to your make commanddisa-windows-server-2019
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.Better-Safe-Than-Sorry
This repository is part of the paper "Better Safe Than Sorry! Automated Identification of Breaking Security-Configuration Rules" accepted at the "4th ACM/IEEE International Conference on Automation of Software Test (AST)". https://conf.researchr.org/home/ast-2023CODASPY2022
This repository is part of the paper "Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations" presented at the 12th ACM Conference on Data and Application Security and Privacy (CODASPY). http://www.codaspy.org/2022/Automated-Identification-of-Security-Relevant-Configuration-Settings-Using-NLP
This repository is part of the paper "Automated Identification of Security-Relevant Configuration Settings Using NLP" accepted at the Industry Showcase track at the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). https://conf.researchr.org/track/ase-2022/ase-2022-industry-showcase.Love Open Source and this site? Check out how you can help us