PKU-ASAL / NoDropLinks
☆17Updated last year
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- ☆61Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Updated 3 years ago
- This repository is used to store recording about papers and presentations readed.☆18Updated last year
- ☆13Updated 4 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆27Updated 2 years ago
- A tool for automatically identifying syscall-guard variables☆36Updated 8 months ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Updated last year
- ☆16Updated 2 years ago
- ☆12Updated 3 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- ☆19Updated 2 years ago
- ☆23Updated 6 years ago
- ☆28Updated 4 years ago
- A list of data-only attacks☆20Updated 5 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆80Updated 3 months ago
- Practical Tamper-Proof System Auditing☆15Updated 2 years ago
- ☆82Updated 4 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆25Updated 10 months ago
- Awesome materials for software supply chain security☆18Updated 5 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16Updated 8 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- ☆32Updated 8 months ago