BINSEC Team @ Université Paris-Saclay, CEA, List

649 posts

BINSEC Team @ Université Paris-Saclay, CEA, List banner
BINSEC Team @ Université Paris-Saclay, CEA, List

BINSEC Team @ Université Paris-Saclay, CEA, List

@BinsecTool

Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin

Paris, France เข้าร่วม Eylül 2020
353 กำลังติดตาม931 ผู้ติดตาม
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Sébastien Bardin
Sébastien Bardin@Seb_Bardin·
Deadline is approaching for the BAR workshop. Still one week to deliver your great submissions!
Sébastien Bardin@Seb_Bardin

Interested in binary code analysis for security and reverse? The *BAR workshop* comes back for its 8th edition, once again with @NDSSSymposium in beautiful SanDiego. Submission 13 Jan 2026, Workshop 27 Feb 2026 ndss-symposium.org/ndss2026/submi…

English
0
2
3
271
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Sébastien Bardin
Sébastien Bardin@Seb_Bardin·
@USENIXSecurity 2025 is starting in 1h and something! My amazing student GuilhemLacombe will present our work entitled "Attacker Control and Bug Prioritization" on August 14 (4pm session, track 2). Want to know more about assessing the danger of a vulnerability without generating exploit? Glad to chat about it! binsec.github.io/assets/publica… @BinsecTool @CEA_List @UPSaclay
Sébastien Bardin tweet media
English
1
4
13
772
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Sébastien Bardin
Sébastien Bardin@Seb_Bardin·
Back from @PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…
Sébastien Bardin tweet media
English
0
7
44
3.2K
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Michaël Marcozzi 🇪🇺🇧🇪
Michaël Marcozzi 🇪🇺🇧🇪@michaelmarcozzi·
Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️ github.com/binsec/rosarum
English
0
4
9
403
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Dimitri Kokkonis
Dimitri Kokkonis@plumtrie·
Very honored to receive the Best Artifact award at #icse2025 🥳 Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli
Dimitri Kokkonis tweet media
English
0
2
6
586
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Sébastien Bardin
Sébastien Bardin@Seb_Bardin·
Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity 2025 -- joint work with Guilhem Lacombe binsec.github.io/nutshells/usen…
Sébastien Bardin tweet media
English
1
7
26
1.9K
BINSEC Team @ Université Paris-Saclay, CEA, List รีทวีตแล้ว
Dimitri Kokkonis
Dimitri Kokkonis@plumtrie·
On my way to Ottawa and @ICSEconf 🍁 Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️
BINSEC Team @ Université Paris-Saclay, CEA, List@BinsecTool

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

English
0
1
3
481