OSUSecLab / AutoMapLinks
☆10Updated 2 years ago
Alternatives and similar repositories for AutoMap
Users that are interested in AutoMap are comparing it to the libraries listed below
Sorting:
- Artifacts for CO3: Concolic Co-execution for Firmware☆10Updated 6 months ago
- Directed fuzzing framework for gVisor.☆24Updated last year
- ☆24Updated 10 months ago
- The published code repo for the Cortex-M SoK paper.☆19Updated 3 weeks ago
- ☆61Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- ☆55Updated last year
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year
- AFL/AFL++ version FishFuzz☆92Updated 4 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Updated last year
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆96Updated last year
- ☆28Updated 2 years ago
- ☆34Updated 2 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 7 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆139Updated last year
- ☆27Updated 3 years ago
- ☆18Updated 7 months ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated last year
- Source code of SEmu-Fuzz☆22Updated 7 months ago
- ☆18Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆80Updated last month
- ☆77Updated 3 years ago
- ☆92Updated last year
- ☆78Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆138Updated last year
- Source code release for the KRace project☆28Updated 3 years ago