
BINSEC Team @ Université Paris-Saclay, CEA, List
@BinsecTool
Followers
917
Following
582
Media
86
Statuses
647
Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin
Paris, France
Joined September 2020
RT @Seb_Bardin: Back from @PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbol….
0
7
0
RT @michaelmarcozzi: Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!. 🏠 https:/….
0
4
0
RT @michaelmarcozzi: Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing:. ▶️ It is a fuzzing benchmark (….
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
4
0
Xyntia is now linked to Binsec ( and handles many architectures: x86_32/64, ARMv7/v8, RISCV and PowerPC64. Try it on all your use cases.
github.com
BINSEC binary-level open-source platform. Contribute to binsec/binsec development by creating an account on GitHub.
1
0
0
📢Xyntia 0.2.0 is now available 📢. You are a reverse engineer, and you need to simplify highly obfuscated expressions (e.g., MBA)?. Try Xyntia 0.2.0, the black-box deobfuscator: It includes many new features!.
github.com
Xyntia, the black-box deobfuscator. Contribute to binsec/xyntia development by creating an account on GitHub.
1
6
9
How to detect backdoors efficiently?. 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at. ⬇️
0
4
14
RT @plumtrie: Very honored to receive the Best Artifact award at #icse2025 🥳. Congrats and thank you to my coauthors! @michaelmarcozzi, Emi….
0
2
0
RT @Seb_Bardin: Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization ha….
0
8
0
JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks!. We offer a stimulating and open-minded scientific environment in English, in wonderful Paris!. APPLY AT
How to detect backdoors efficiently?. ▶️ Backdoors were found in firmware & open-source code.▶️ Detection requires much manual reverse-engineering .▶️ Fuzzers cannot see backdoors. Our @ICSEconf preprint on finding backdoors with fuzzing is at A thread ⬇️
0
3
8
RT @michaelmarcozzi: 📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks!. Come and join the team here i….
0
3
0
RT @michaelmarcozzi: 🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! . Try it out: .
0
6
0
RT @plumtrie: We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor….
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
1
0
RT @michaelmarcozzi: Happy to read such enthusiastic reactions to our @ICSEconf paper! ☺️. "ROSA Sets a New Standard for Backdoor Detection….
medium.com
The security industry is constantly battling against hidden backdoors—maliciously planted vulnerabilities that grant attackers undocumented…
0
3
0