☆12Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for LLVM-CFI
Users that are interested in LLVM-CFI are comparing it to the libraries listed below
Sorting:
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- NoVT is a compiler-based defense against vtable hijacking in C++ programs. It compiles C++ programs without using vtables.☆50Sep 29, 2022Updated 3 years ago
- Stony Brook University CFI library☆22Sep 30, 2014Updated 11 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- 64-bit port of the RIPE benchmark (buffer overflow attacks). RIPE was originally developed by John Wilander and Nick Nikiforakis and pres…☆23Jan 28, 2022Updated 4 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- Sth in Control-Flow Integrity☆20Dec 25, 2018Updated 7 years ago
- Simple Library calls tracer☆22Feb 19, 2018Updated 8 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- uber eXtensible Micro-Hypervisor Framework☆33Jun 19, 2024Updated last year
- A design automation framework to engineer decision diagrams yourself☆26Updated this week
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- This is a Login application for Android using Parse server.☆10Nov 26, 2018Updated 7 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- TOPPERSユーザーズフォーラム:ユーザのためのQ&Aおよび情報交換の場☆12Jun 16, 2022Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- This specification is integrated into the Priv. and Unpriv. specifications. This repo is no longer maintained. Please refer to the Priv. …☆96Updated this week
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Scripts for Digital Design flow control.☆16Oct 30, 2025Updated 4 months ago
- A simple tool to demonstrate the physical design steps of VLSI Design Flow.☆10Dec 13, 2020Updated 5 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- 不定期更新爬取各国网站的爬虫源码☆10Aug 15, 2018Updated 7 years ago
- ELVE : ELVE Logic Visualization Engine☆11Jul 2, 2017Updated 8 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago