binsec / haunted
Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.
☆17Updated last year
Alternatives and similar repositories for haunted:
Users that are interested in haunted are comparing it to the libraries listed below
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆33Updated 3 months ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- An approximate solver for concolic execution☆18Updated last week
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆40Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆28Updated last year
- An opinionated tool to create amazing presentations☆36Updated 2 years ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- Efficient Sampling of SAT Solutions for Testing☆34Updated 5 years ago
- AIL: The angr Intermediate Language.☆32Updated this week
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- Side-channel Analysis☆15Updated 2 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆34Updated 5 years ago
- Verified, Incremental, Binary Editing with Synthesis☆54Updated 2 years ago
- ☆35Updated 8 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- Implementation of the IC3 / Property Directed Reachability algorithm using the the Z3 SMT solver.☆15Updated 9 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆73Updated 2 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- ☆25Updated 3 years ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆66Updated 2 months ago
- A collection of ready to use binary analysis tools☆57Updated last year
- Automatic detection of speculative information flows☆68Updated 3 years ago
- Dynamically discover the commands used to create a piece of software☆49Updated 2 months ago
- ☆39Updated 6 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago