RUB-SysSec / adversarial-papers
☆15Updated last year
Related projects ⓘ
Alternatives and complementary repositories for adversarial-papers
- ☆9Updated 5 years ago
- ☆11Updated 3 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- A coverage-based software testing tool☆29Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- Practical Data-Only Attack Generation☆27Updated 5 months ago
- experiments for IJON☆11Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆12Updated 2 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- PoC exploits against various SGX enclaves☆15Updated 2 years ago
- ☆25Updated 6 years ago
- The PT tracing portion of Barnum.☆11Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- ☆23Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆10Updated 4 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 2 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated 4 months ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆39Updated last year
- ☆17Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- ☆11Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year