☆25Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for ConFIRM
Users that are interested in ConFIRM are comparing it to the libraries listed below
Sorting:
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Sth in Control-Flow Integrity☆19Dec 25, 2018Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- ☆18Sep 1, 2018Updated 7 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆93Aug 9, 2017Updated 8 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- ☆51Nov 15, 2021Updated 4 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Feb 23, 2023Updated 3 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- GPU-enabled Hardware Fuzzer using Genetic Algorithm☆20Jul 12, 2023Updated 2 years ago
- ☆25Sep 30, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Sep 29, 2023Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago