PKU-ASAL / NoDropLinks
☆16Updated last year
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆27Updated 2 years ago
- ☆61Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- A tool for automatically identifying syscall-guard variables☆35Updated 6 months ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated 11 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆75Updated last month
- An standalone execution trace library built on DynamoRIO.☆23Updated 3 years ago
- ☆29Updated 5 months ago
- ☆28Updated 3 years ago
- ☆17Updated last year
- Official repository of SyzRisk [ASIA CCS'24]☆12Updated last year
- ☆23Updated 5 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆13Updated 4 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- A list of data-only attacks☆20Updated 2 months ago
- Practical Tamper-Proof System Auditing☆14Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆36Updated last year
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- ☆81Updated 4 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 6 months ago
- ☆19Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- ☆97Updated last year
- ☆23Updated 7 months ago