ReMon-MVEE / ReMon
☆27Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for ReMon
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆55Updated 2 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- Timeless debugging with symbolic execution and processor trace☆74Updated 3 years ago
- ☆95Updated 5 years ago
- K-Miner☆72Updated 5 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 5 years ago
- ☆67Updated 4 years ago
- MCFI/PICFI tool chain☆42Updated 8 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆34Updated last week
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- Constraint solver based on coverage-guided fuzzing☆239Updated 11 months ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆37Updated 4 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆113Updated 4 years ago
- ☆39Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 3 years ago
- ☆37Updated 2 years ago
- Software artifact for incremental CFG patching paper appearing in ASPLOS 21☆12Updated last year
- This repository contains several examples of logic bomb.☆96Updated 10 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆58Updated 2 years ago
- FoRTE-Research's fuzzing benchmarks☆54Updated 5 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- ☆36Updated 5 years ago
- ☆63Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago