CamFlow / camflow-dev
Generates kernel patch for CamFlow Linux Provenance Capture.
☆26Updated last year
Alternatives and similar repositories for camflow-dev:
Users that are interested in camflow-dev are comparing it to the libraries listed below
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- ☆97Updated 4 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆19Updated 3 months ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- ☆14Updated 3 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆174Updated 2 weeks ago
- ☆28Updated 3 years ago
- Have fun with audit log analysis :)☆148Updated 9 months ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆25Updated last year
- ☆11Updated 5 years ago
- This repository is used to analysis the shared resources of different containers☆28Updated 4 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 4 years ago
- Datasets used in the StreamSpot experiments☆57Updated 9 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆20Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- Usenix Security'23☆14Updated 2 years ago
- KVM-based virtual machine introspection for malware analysis☆29Updated 7 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 3 months ago
- ☆44Updated 2 years ago
- ☆75Updated last year
- Onsite Analysis Infrastructure☆17Updated 4 years ago