RUB-SysSec / adversarial-papersLinks
☆16Updated 2 years ago
Alternatives and similar repositories for adversarial-papers
Users that are interested in adversarial-papers are comparing it to the libraries listed below
Sorting:
- Securing System Logs With Intel SGX☆15Updated 8 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Concolic Execution Fuzzer☆24Updated 4 years ago
- experiments for IJON☆12Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆14Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Grey-box fuzzer SIVO☆14Updated 4 years ago
- ☆12Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Updated 4 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆10Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Updated 6 years ago
- A set of templates for different academic venues.☆28Updated 6 years ago
- ☆18Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- ☆16Updated 5 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆34Updated 5 years ago
- ☆19Updated 2 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- PoC for the taint-based ROP approach☆14Updated 2 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago