Partitioned Unit Memory Management
☆16Nov 28, 2022Updated 3 years ago
Alternatives and similar repositories for PUMM
Users that are interested in PUMM are comparing it to the libraries listed below
Sorting:
- ☆18Sep 4, 2023Updated 2 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆17Jun 7, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆35Feb 4, 2026Updated last month
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆56Jun 6, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- ☆37May 19, 2023Updated 2 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Apr 24, 2017Updated 8 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- ☆41Feb 26, 2023Updated 3 years ago
- ☆10Aug 10, 2020Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- ☆11Aug 28, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Generator and Internet Draft (I-D) documenting test vectors for the stream cipher ChaCha.☆12Apr 21, 2016Updated 9 years ago
- Vortex finder for time-dependent Ginzburg-Landau superconductor simulation data☆11Oct 20, 2020Updated 5 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- ☆12Nov 19, 2025Updated 3 months ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆18Oct 1, 2025Updated 5 months ago
- ☆10May 12, 2023Updated 2 years ago