Keysight / optee_fuzzerLinks
This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.
☆138Updated 3 years ago
Alternatives and similar repositories for optee_fuzzer
Users that are interested in optee_fuzzer are comparing it to the libraries listed below
Sorting:
- ☆65Updated 6 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 6 months ago
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- ☆72Updated 5 years ago
- ☆50Updated last week
- Recent security papers on firmware analysis☆76Updated 3 years ago
- ☆66Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆62Updated last year
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Repository for monolithic firmware blobs☆79Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- ☆160Updated 3 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆80Updated 5 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆139Updated last year
- ☆46Updated 2 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆103Updated 6 years ago
- ☆65Updated 7 months ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- K-Miner☆75Updated 6 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ☆55Updated last year
- ☆46Updated 3 years ago