RiS3-Lab / DICE-DMA-Emulation
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
☆61Updated last year
Alternatives and similar repositories for DICE-DMA-Emulation:
Users that are interested in DICE-DMA-Emulation are comparing it to the libraries listed below
- Perry: automated peripheral modeling with symbolic execution☆24Updated 8 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Repository for monolithic firmware blobs☆72Updated 2 years ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- ☆29Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆134Updated last year
- ☆18Updated 2 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆134Updated last year
- ☆48Updated last year
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- ☆50Updated 10 months ago
- ☆26Updated last year
- A regression greybox fuzzer aflchurn☆65Updated 2 years ago
- ☆10Updated last year
- A data-flow-guided fuzzer☆111Updated last year
- ☆52Updated 9 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆82Updated 2 years ago
- ☆20Updated 5 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- UAF Fuzzing Benchmark☆57Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆98Updated 2 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 2 months ago
- Real firmware fuzz-tested in P2IM paper☆23Updated 4 years ago
- ☆67Updated 7 months ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆28Updated 8 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- ☆64Updated 5 years ago
- ☆27Updated 3 years ago