BINSEC Team @ Université Paris-Saclay, CEA, List
@BinsecTool
Followers
930
Following
582
Media
86
Statuses
649
Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin
Paris, France
Joined September 2020
Finding bugs is nice, finding bugs that are replicable for sure is nicer. Our prototypes for robust reachability and quantitative robustness are now fully integrated in the BINSEC plugin mechanism https://t.co/1VE2Efot3s
0
1
2
@USENIXSecurity 2025 is starting in 1h and something! My amazing student GuilhemLacombe will present our work entitled "Attacker Control and Bug Prioritization" on August 14 (4pm session, track 2). Want to know more about assessing the danger of a vulnerability without
1
4
13
Back from @PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: https://t.co/pUUw41V8eR
0
7
45
Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 https://t.co/aafO9G0s9x 🧑🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
0
4
10
Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
4
9
You are thrilled? Then 1. Install Xyntia or use our Docker image: https://t.co/cITICZ2nVe 2. Check our tutorial: https://t.co/Q6c1fCy67Q 3. Deobfuscate binary code 😈
0
0
0
Xyntia includes new operators and new grammars, making synthesis more flexible
1
0
0
Xyntia can output Sygus2 problems to easily compare with other synthesizers. Try it and send us feedback
1
0
0
Xyntia includes a Counter-Example-Guided-Synthesis (CEGIS) loop
1
0
0
Sampling and equivalence checking against ground truth are now integrated in Xyntia
1
0
0
Xyntia is now linked to Binsec ( https://t.co/lBNz4qRoGY) and handles many architectures: x86_32/64, ARMv7/v8, RISCV and PowerPC64. Try it on all your use cases
github.com
BINSEC binary-level open-source platform. Contribute to binsec/binsec development by creating an account on GitHub.
1
0
0
📢Xyntia 0.2.0 is now available 📢 You are a reverse engineer, and you need to simplify highly obfuscated expressions (e.g., MBA)? Try Xyntia 0.2.0, the black-box deobfuscator: https://t.co/UO5p1RLzwl It includes many new features!
github.com
Xyntia, the black-box deobfuscator. Contribute to binsec/xyntia development by creating an account on GitHub.
1
6
9
How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ https://t.co/6DOvrsk3vY
0
4
14
Very honored to receive the Best Artifact award at #icse2025 🥳 Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli
0
2
6
Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity 2025 -- joint work with Guilhem Lacombe https://t.co/ZiE5pimLfx
1
7
26
On my way to Ottawa and @ICSEconf 🍁 Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
1
3
JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks! We offer a stimulating and open-minded scientific environment in English, in wonderful Paris! APPLY AT https://t.co/03meD0s4gc
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
3
8
📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: https://t.co/mi71a6UDeE
0
3
5
🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! Try it out: https://t.co/kKrreOlERn Huge thanks and congrats to my student @plumtrie for his huge and great work! 👏👏👏
2
5
31
We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor detection 🎉 Tool: https://t.co/UXn25CW6st Benchmark: https://t.co/UXc5POkpYw This work received both Available & Reusable badges at @ICSEconf 🥳
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
1
7