BinsecTool Profile Banner
BINSEC Team @ Université Paris-Saclay, CEA, List Profile
BINSEC Team @ Université Paris-Saclay, CEA, List

@BinsecTool

Followers
930
Following
582
Media
86
Statuses
649

Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin

Paris, France
Joined September 2020
Don't wanna be here? Send us removal request.
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Finding bugs is nice, finding bugs that are replicable for sure is nicer. Our prototypes for robust reachability and quantitative robustness are now fully integrated in the BINSEC plugin mechanism https://t.co/1VE2Efot3s
0
1
2
@Seb_Bardin
Sébastien Bardin
4 months
@USENIXSecurity 2025 is starting in 1h and something! My amazing student GuilhemLacombe will present our work entitled "Attacker Control and Bug Prioritization" on August 14 (4pm session, track 2). Want to know more about assessing the danger of a vulnerability without
1
4
13
@Seb_Bardin
Sébastien Bardin
5 months
Back from @PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: https://t.co/pUUw41V8eR
0
7
45
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
7 months
Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 https://t.co/aafO9G0s9x 🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
0
4
10
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️
Tweet card summary image
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
4
9
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
You are thrilled? Then 1. Install Xyntia or use our Docker image: https://t.co/cITICZ2nVe 2. Check our tutorial: https://t.co/Q6c1fCy67Q 3. Deobfuscate binary code 😈
0
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
Xyntia includes new operators and new grammars, making synthesis more flexible
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
Xyntia can output Sygus2 problems to easily compare with other synthesizers. Try it and send us feedback
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
Xyntia includes a Counter-Example-Guided-Synthesis (CEGIS) loop
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
Sampling and equivalence checking against ground truth are now integrated in Xyntia
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
Xyntia is now linked to Binsec ( https://t.co/lBNz4qRoGY) and handles many architectures: x86_32/64, ARMv7/v8, RISCV and PowerPC64. Try it on all your use cases
github.com
BINSEC binary-level open-source platform. Contribute to binsec/binsec development by creating an account on GitHub.
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
📢Xyntia 0.2.0 is now available 📢 You are a reverse engineer, and you need to simplify highly obfuscated expressions (e.g., MBA)? Try Xyntia 0.2.0, the black-box deobfuscator: https://t.co/UO5p1RLzwl It includes many new features!
Tweet card summary image
github.com
Xyntia, the black-box deobfuscator. Contribute to binsec/xyntia development by creating an account on GitHub.
1
6
9
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ https://t.co/6DOvrsk3vY
0
4
14
@plumtrie
Dimitri Kokkonis
8 months
Very honored to receive the Best Artifact award at #icse2025 🥳 Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli
0
2
6
@Seb_Bardin
Sébastien Bardin
8 months
Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity 2025 -- joint work with Guilhem Lacombe https://t.co/ZiE5pimLfx
1
7
26
@plumtrie
Dimitri Kokkonis
8 months
On my way to Ottawa and @ICSEconf 🍁 Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
1
3
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks! We offer a stimulating and open-minded scientific environment in English, in wonderful Paris! APPLY AT https://t.co/03meD0s4gc
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
3
8
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: https://t.co/mi71a6UDeE
0
3
5
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
9 months
🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! Try it out: https://t.co/kKrreOlERn Huge thanks and congrats to my student @plumtrie for his huge and great work! 👏👏👏
2
5
31
@plumtrie
Dimitri Kokkonis
10 months
We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor detection 🎉 Tool: https://t.co/UXn25CW6st Benchmark: https://t.co/UXc5POkpYw This work received both Available & Reusable badges at @ICSEconf 🥳
Tweet card summary image
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
1
7