binsec / klee21-tina-artifact
TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semantically equivalent C code amenable to verification, in order to take advantage of existing C analyzers.
☆27Updated 3 years ago
Alternatives and similar repositories for klee21-tina-artifact:
Users that are interested in klee21-tina-artifact are comparing it to the libraries listed below
- A symbolic execution engine for LLVM IR☆34Updated 2 years ago
- Dr. Disassembler☆35Updated 3 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- A library for dynamic binary rewriting☆57Updated 4 years ago
- print information from LLVM dataflow analyses☆13Updated 5 years ago
- TracerX Symbolic Virtual Machine☆33Updated 3 weeks ago
- Tutorial for Building Program Reasoning Tools using LLVM and Z3☆19Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- llvm crash analysis☆41Updated 7 months ago
- AIL: The angr Intermediate Language.☆31Updated this week
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆24Updated 4 years ago
- ☆30Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- Measure branching along code paths☆20Updated 8 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆34Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆32Updated last year
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- TRACER Symbolic Execution Tool☆28Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- An approximate solver for concolic execution☆17Updated 2 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆20Updated last year
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆19Updated this week
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 4 years ago
- Extracting high level semantic information from binary code☆64Updated 5 years ago
- Sydr benchmark applications☆17Updated 2 years ago
- A blanked execution framework based on the Unicorn engine☆19Updated 8 years ago