BinsecTool Profile Banner
BINSEC Team @ Université Paris-Saclay, CEA, List Profile
BINSEC Team @ Université Paris-Saclay, CEA, List

@BinsecTool

Followers
917
Following
582
Media
86
Statuses
647

Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin

Paris, France
Joined September 2020
Don't wanna be here? Send us removal request.
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
15 days
RT @Seb_Bardin: Back from @PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbol….
0
7
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
2 months
RT @michaelmarcozzi: Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!. 🏠 https:/….
0
4
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
RT @michaelmarcozzi: Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing:. ▶️ It is a fuzzing benchmark (….
Tweet card summary image
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
4
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
You are thrilled? Then. 1. Install Xyntia or use our Docker image: 2. Check our tutorial: 3. Deobfuscate binary code 😈.
0
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Xyntia includes new operators and new grammars, making synthesis more flexible.
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Xyntia can output Sygus2 problems to easily compare with other synthesizers. Try it and send us feedback.
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Xyntia includes a Counter-Example-Guided-Synthesis (CEGIS) loop.
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Sampling and equivalence checking against ground truth are now integrated in Xyntia
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
Xyntia is now linked to Binsec ( and handles many architectures: x86_32/64, ARMv7/v8, RISCV and PowerPC64. Try it on all your use cases.
Tweet card summary image
github.com
BINSEC binary-level open-source platform. Contribute to binsec/binsec development by creating an account on GitHub.
1
0
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
📢Xyntia 0.2.0 is now available 📢. You are a reverse engineer, and you need to simplify highly obfuscated expressions (e.g., MBA)?. Try Xyntia 0.2.0, the black-box deobfuscator: It includes many new features!.
Tweet card summary image
github.com
Xyntia, the black-box deobfuscator. Contribute to binsec/xyntia development by creating an account on GitHub.
1
6
9
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
How to detect backdoors efficiently?. 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at. ⬇️
Tweet media one
0
4
14
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
RT @plumtrie: Very honored to receive the Best Artifact award at #icse2025 🥳. Congrats and thank you to my coauthors! @michaelmarcozzi, Emi….
0
2
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
RT @Seb_Bardin: Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization ha….
0
8
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
RT @plumtrie: On my way to Ottawa and @ICSEconf 🍁. Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️.
0
1
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
3 months
JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks!. We offer a stimulating and open-minded scientific environment in English, in wonderful Paris!. APPLY AT
Tweet media one
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
6 months
How to detect backdoors efficiently?. ▶️ Backdoors were found in firmware & open-source code.▶️ Detection requires much manual reverse-engineering .▶️ Fuzzers cannot see backdoors. Our @ICSEconf preprint on finding backdoors with fuzzing is at A thread ⬇️
Tweet media one
0
3
8
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
4 months
RT @michaelmarcozzi: 📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks!. Come and join the team here i….
0
3
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
4 months
RT @michaelmarcozzi: 🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! . Try it out: .
0
6
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
5 months
RT @plumtrie: We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor….
Tweet card summary image
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
1
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
5 months
RT @michaelmarcozzi: Happy to read such enthusiastic reactions to our @ICSEconf paper! ☺️. "ROSA Sets a New Standard for Backdoor Detection….
Tweet card summary image
medium.com
The security industry is constantly battling against hidden backdoors—maliciously planted vulnerabilities that grant attackers undocumented…
0
3
0
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
6 months
Two years ago, we reimplemented and optimized the symbolic relational engine of BINSEC, but the secret erasure check was not ported. It is back now, and fully integrated. Do not hesitate to play with it!.
0
0
1