PKU-ASAL / PKUWA
☆12Updated 8 months ago
Alternatives and similar repositories for PKUWA:
Users that are interested in PKUWA are comparing it to the libraries listed below
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 5 months ago
- Implementation of the Reusable Enclaves paper☆12Updated last year
- ☆12Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆10Updated 11 months ago
- A native symbolic execution engine for WebAssembly☆43Updated 7 months ago
- ☆14Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- ☆22Updated 4 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 3 months ago
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 2 years ago
- ☆16Updated last year
- ☆19Updated 2 years ago
- ☆60Updated 2 years ago
- ☆12Updated 2 years ago
- caijiqhx notes☆17Updated 4 months ago
- ☆22Updated last year
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Updated 4 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆21Updated 5 years ago
- A JIT Compiler Fuzzer for JVMs via CSX/JoNM in "Validating JIT Compilers via Compilation Space Exploration" (SOSP'23)☆52Updated 2 months ago
- ☆33Updated last year
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆22Updated 7 months ago
- A Pointer Analysis Framework for Rust☆48Updated last month
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆37Updated 2 years ago
- ☆19Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆38Updated last year