RiS3-Lab / DICE-DMA-EmulationLinks
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
☆64Updated 2 years ago
Alternatives and similar repositories for DICE-DMA-Emulation
Users that are interested in DICE-DMA-Emulation are comparing it to the libraries listed below
Sorting:
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated 11 months ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Automated IoT firmware fuzzing framework.☆83Updated 6 years ago
- Repository for monolithic firmware blobs☆87Updated 3 years ago
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- ☆18Updated last year
- ☆67Updated 6 years ago
- ☆57Updated last year
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- a blackbox network fuzzer for IoT devices☆56Updated last year
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 5 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- UAF Fuzzing Benchmark☆58Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 4 years ago
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- ☆37Updated 3 years ago
- ☆53Updated 6 months ago
- implementing collafl☆26Updated 5 years ago
- ☆75Updated 3 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆107Updated 6 years ago
- ☆45Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- A regression greybox fuzzer aflchurn☆67Updated 3 years ago
- ☆98Updated 2 years ago