☆12Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for LLVM-CFI
Users that are interested in LLVM-CFI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- NoVT is a compiler-based defense against vtable hijacking in C++ programs. It compiles C++ programs without using vtables.☆50Sep 29, 2022Updated 3 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- 64-bit port of the RIPE benchmark (buffer overflow attacks). RIPE was originally developed by John Wilander and Nick Nikiforakis and pres…☆23Jan 28, 2022Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 9 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- Sth in Control-Flow Integrity☆20Dec 25, 2018Updated 7 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- ☆15Jan 24, 2016Updated 10 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- A collection of command-line tools based on Dyninst☆18Jun 3, 2021Updated 4 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- ☆14Nov 10, 2019Updated 6 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- uber eXtensible Micro-Hypervisor Framework☆33Jun 19, 2024Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Sep 2, 2023Updated 2 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆84Jun 21, 2020Updated 5 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Experiments in abstracting definitional interpreters☆16Oct 13, 2017Updated 8 years ago