binsec / haunted
Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.
☆16Updated last year
Alternatives and similar repositories for haunted:
Users that are interested in haunted are comparing it to the libraries listed below
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆33Updated 2 months ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- An approximate solver for concolic execution☆18Updated 3 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆41Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year
- KLEE / CSE Project☆44Updated 4 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 6 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆56Updated 3 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆20Updated last year
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- Verified, Incremental, Binary Editing with Synthesis☆54Updated 2 years ago
- Scalable Validator for Binary Lifters☆55Updated 4 years ago
- ☆12Updated 3 years ago
- Side-channel Analysis☆15Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- ☆25Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ☆37Updated 2 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- ☆38Updated 6 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- TracerX Symbolic Virtual Machine☆33Updated 2 months ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆37Updated 3 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- Automatic detection of speculative information flows☆67Updated 3 years ago
- ☆17Updated 4 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago