CTSRD-SOAAP / soaapLinks
Security-Oriented Analysis of Application Programs
☆13Updated 6 years ago
Alternatives and similar repositories for soaap
Users that are interested in soaap are comparing it to the libraries listed below
Sorting:
- A dynamic analysis framework for C and C++ programs☆29Updated 3 months ago
- Secure Virtual Architecture☆42Updated 6 years ago
- The Cloud9 main repository☆52Updated 12 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- KLEE in the browser☆52Updated 2 months ago
- TRACER Symbolic Execution Tool☆28Updated 5 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Securing System Logs With Intel SGX☆15Updated 8 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 12 years ago
- KLEE's version of uClibc☆55Updated last year
- TypeSan checks casts in C++ code - code released for CCS 2016☆35Updated 4 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- Measure branching along code paths☆20Updated 8 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago
- A dynamic analysis framework for concurrent programs (x86 binaries). It is shipped with a few tools written using this framework for test…☆70Updated 8 years ago
- Configurable instrumentation of LLVM bitcode☆34Updated 5 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Updated last year
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Monitor, rewrite and/or otherwise trap system calls... on Linux/x86{,-64} only, for now.☆62Updated last week
- Tracing framework for full system simulators☆57Updated 10 years ago
- Steps to build the Linux kernel using Clang☆102Updated 3 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 9 years ago
- ☆74Updated 3 years ago
- Picon☆39Updated 8 years ago
- Experimental setup of "Intel MPX explained"☆28Updated 5 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Program Analysis for LLVM☆38Updated 8 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago