ReMon-MVEE / ReMon
☆27Updated 6 months ago
Alternatives and similar repositories for ReMon:
Users that are interested in ReMon are comparing it to the libraries listed below
- KLEE / CSE Project☆43Updated 4 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- ☆96Updated 5 years ago
- ☆55Updated 2 years ago
- ☆70Updated 5 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- Timeless debugging with symbolic execution and processor trace☆74Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- K-Miner☆75Updated 5 years ago
- MCFI/PICFI tool chain☆42Updated 10 months ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Updated 2 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆59Updated 2 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆65Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- ☆50Updated 7 years ago
- LLVM meets Code Property Graphs☆90Updated 3 years ago
- ☆39Updated 3 years ago
- ☆64Updated 5 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- Utilities for generating dynamic traces☆89Updated 2 years ago
- ☆37Updated 5 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 2 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Updated 5 years ago