SoftSec-KAIST / BotScreenLinks
BotScreen: Trust Everybody, but Cut the Aimbots Yourself (USENIX Security '23)
☆13Updated 2 years ago
Alternatives and similar repositories for BotScreen
Users that are interested in BotScreen are comparing it to the libraries listed below
Sorting:
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆17Updated 4 months ago
- ☆146Updated last year
- ☆10Updated 3 years ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- Solidity Exploit Helper v.0.2☆30Updated 7 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆81Updated 2 years ago
- AoT is a system for automatically generating off-target test harness by using build information.☆38Updated 10 months ago
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆31Updated 2 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- a paper template☆58Updated 2 months ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated last year
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 11 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆205Updated 3 years ago
- ☆85Updated 11 months ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆25Updated last year
- A framework to test the correctness of the Linux kernel patch.☆22Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- UT based automated fuzz driver generation☆168Updated 6 months ago
- ☆68Updated last year
- Symbolic Execution Over Processor Traces☆124Updated last year
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Updated 3 years ago
- Recent symbolic execution papers and tools.☆178Updated 5 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 8 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆45Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated last week
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Implementation of DigFuzz (NDSS19 "Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing")☆23Updated 3 years ago
- We hinder fuzzing☆68Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago