DependableSystemsLab / pinfi
PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:
☆16Updated 6 years ago
Alternatives and similar repositories for pinfi:
Users that are interested in pinfi are comparing it to the libraries listed below
- ☆16Updated 10 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆20Updated 7 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Updated 3 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- Program synthesis tools and utilities for LLVM.☆20Updated last year
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Tracing framework for full system simulators☆55Updated 9 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆21Updated 5 years ago
- PIN-tool to produce multi-threaded atomic memory traces☆36Updated 11 years ago
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆12Updated 2 weeks ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Updated 8 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆15Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 9 months ago
- ☆16Updated last year
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- ☆12Updated 3 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago
- Tutorial for Building Program Reasoning Tools using LLVM and Z3☆19Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- SUPA☆28Updated 4 years ago
- Dynamic Control Flow Recovery☆24Updated 7 years ago
- Securing System Logs With Intel SGX☆14Updated 8 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Updated 7 years ago
- HW interface for memory caches☆26Updated 4 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆14Updated last month