OSUSecLab / LeakScopeLinks
Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app
☆43Updated 5 years ago
Alternatives and similar repositories for LeakScope
Users that are interested in LeakScope are comparing it to the libraries listed below
Sorting:
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 6 months ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆47Updated 5 years ago
- ☆24Updated last year
- DiAne is a smart fuzzer for IoT devices☆39Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 5 years ago
- ☆77Updated 3 years ago
- Source-binary patch presence test system.☆83Updated 2 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- COVA - A static analysis tool to compute path conditions☆36Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- ☆24Updated last year
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- ☆44Updated 4 years ago
- ☆46Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 6 years ago
- IoT Security Papers☆48Updated 5 years ago
- ☆14Updated 3 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆21Updated 2 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- ☆42Updated 6 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆25Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 5 years ago
- aurora-d☆20Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago