Mic92 / inspectorLinks
Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.
☆14Updated 9 years ago
Alternatives and similar repositories for inspector
Users that are interested in inspector are comparing it to the libraries listed below
Sorting:
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56Updated 3 years ago
- ☆56Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Updated 7 years ago
- Explore LLVM Bitcode interactively using a graph database☆58Updated 5 years ago
- Runtime type and bounds-error checking for C/C++☆106Updated last year
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- SUPA☆28Updated 5 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Updated 5 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago
- git://g.csail.mit.edu/kint☆51Updated 12 years ago
- ☆38Updated 3 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- LLFI is an LLVM based fault injection tool, that injects faults into the LLVM IR of the application source code. The faults can be injec…☆77Updated 3 years ago
- ☆12Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated last year
- ☆52Updated 3 years ago
- ☆24Updated 7 years ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 4 years ago
- Hardware-assisted Data-flow Isolation☆29Updated 7 years ago
- Verification of BPF JIT compilers☆57Updated 2 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Updated last year
- ☆18Updated 7 years ago
- ☆17Updated 6 years ago
- ☆24Updated 2 years ago
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 6 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 9 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago