PKU-ASAL / NoDropLinks
☆16Updated 9 months ago
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 years ago
- This repository is used to analysis the shared resources of different containers☆30Updated 8 months ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- ☆28Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆62Updated 5 months ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- ☆13Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- A tool for automatically identifying syscall-guard variables☆34Updated last month
- ☆77Updated 3 years ago
- ☆13Updated last year
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Practical Tamper-Proof System Auditing☆14Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 7 months ago
- ☆22Updated 5 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆34Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆26Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated 10 months ago
- A list of data-only attacks☆19Updated 2 weeks ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆12Updated last month
- ☆14Updated last year
- Practical Data-Only Attack Generation☆40Updated last year
- ☆15Updated 2 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Updated 2 years ago
- ☆19Updated 3 weeks ago
- 国科大软件安全原理作业☆24Updated 4 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆13Updated 2 years ago