PKU-ASAL / NoDrop
☆16Updated 7 months ago
Alternatives and similar repositories for NoDrop:
Users that are interested in NoDrop are comparing it to the libraries listed below
- ☆61Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆29Updated 5 months ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆57Updated 2 months ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated last year
- ☆13Updated 3 years ago
- ☆28Updated 3 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- a new cfi mechanism☆31Updated 3 years ago
- AST interpreter with clang 5.0.0 and llvm 5.0.0☆14Updated 5 years ago
- ☆14Updated last year
- Practical Tamper-Proof System Auditing☆14Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆21Updated 5 months ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- ☆12Updated 2 years ago
- ☆11Updated 5 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated 8 months ago
- Sth in Control-Flow Integrity☆20Updated 6 years ago
- ☆22Updated 5 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- A list of data-only attacks☆19Updated 8 months ago
- Awesome materials for software supply chain security☆17Updated 4 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated last year
- A tool for automatically identifying syscall-guard variables☆34Updated 8 months ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆26Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- ☆13Updated last year