SoftSec-KAIST / BotScreenLinks
BotScreen: Trust Everybody, but Cut the Aimbots Yourself (USENIX Security '23)
☆13Updated 2 years ago
Alternatives and similar repositories for BotScreen
Users that are interested in BotScreen are comparing it to the libraries listed below
Sorting:
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆17Updated 4 months ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- ☆147Updated last year
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆14Updated last year
- Solidity Exploit Helper v.0.2☆30Updated 7 years ago
- ☆10Updated 3 years ago
- ☆69Updated last year
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- UT based automated fuzz driver generation☆168Updated 7 months ago
- Source code release for the KRace project☆29Updated 4 years ago
- Symbolic Execution Over Processor Traces☆124Updated last year
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆31Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated last month
- a paper template☆58Updated 3 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 8 months ago
- ☆46Updated 4 years ago
- ☆42Updated 3 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆81Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆46Updated 2 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆97Updated last week
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Recent symbolic execution papers and tools.☆180Updated 6 months ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆189Updated 2 years ago
- ☆59Updated 2 months ago
- ☆17Updated last year
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago