HUSTSeclab / KernelTestingPapersLinks
Papers related with kernel papers
☆13Updated 2 years ago
Alternatives and similar repositories for KernelTestingPapers
Users that are interested in KernelTestingPapers are comparing it to the libraries listed below
Sorting:
- ☆27Updated 3 years ago
- ☆13Updated last year
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 3 years ago
- ☆22Updated 5 years ago
- ☆42Updated 3 years ago
- ☆19Updated last year
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆34Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆34Updated last year
- ☆14Updated 2 years ago
- ☆18Updated 2 years ago
- ☆38Updated 2 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated 11 months ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 6 months ago
- ☆33Updated 2 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆23Updated 2 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆15Updated 3 years ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆29Updated 2 years ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆26Updated 2 years ago
- ☆25Updated 4 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated last year
- A list of data-only attacks☆19Updated this week
- ☆14Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- ☆61Updated 2 years ago