binsec / haunted
Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for haunted
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆33Updated last year
- An approximate solver for concolic execution☆17Updated 2 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- CClyzer port to souffle lang☆18Updated 9 months ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆57Updated 2 weeks ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆40Updated 4 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- An opinionated tool to create amazing presentations☆36Updated last year
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- print information from LLVM dataflow analyses☆13Updated 4 years ago
- Verified, Incremental, Binary Editing with Synthesis☆51Updated last year
- Dynamically discover the commands used to create a piece of software☆46Updated last week
- CodeHawk Abstract Interpretation Engine and Analyzers☆63Updated this week
- ☆35Updated 7 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- Synthesis of loop-free programs☆14Updated this week
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆57Updated 7 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆39Updated 2 months ago
- Experimental translation of llvm to smt.☆56Updated 4 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆53Updated 2 years ago
- Experimental MLIR based points-to analysis tool☆13Updated this week
- A tool for detecting Spectre vulnerabilities through fuzzing☆35Updated 3 years ago
- Timeless debugging with symbolic execution and processor trace☆74Updated 3 years ago
- ☆36Updated 5 years ago
- ☆16Updated 5 months ago
- TracerX Symbolic Virtual Machine☆31Updated this week
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Updated last year
- Map2Check: Finding Software Vulnerabilities☆27Updated 4 years ago
- ☆19Updated last year