CactiLab / UAFVerif
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for UAFVerif
- Security benchmarks for the Internet of Things☆23Updated 4 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆41Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆26Updated 8 months ago
- ☆11Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- ☆24Updated last year
- PoC exploits against various SGX enclaves☆15Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- ☆12Updated 3 years ago
- FoRTE-Research's fuzzing benchmarks☆54Updated 5 years ago
- ☆25Updated 6 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- ☆71Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- ☆23Updated 2 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 5 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆22Updated 2 years ago
- experiments for IJON☆11Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆23Updated 8 months ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 7 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆13Updated 4 years ago
- ☆19Updated 5 years ago