chosen-instruction-attack / CIA-toolchain
The toolchain of Chosen-instruction attack
☆18Updated 2 years ago
Alternatives and similar repositories for CIA-toolchain:
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- MBA-Blast is a tool for simplification of MBA expressions.☆63Updated 3 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago
- ☆40Updated 3 years ago
- Library for Capstone instruction to LLVM IR translation☆44Updated 7 years ago
- ☆44Updated 7 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆35Updated 4 years ago
- This repo contains the tests and results that were done during the research of SATURN☆38Updated 4 years ago
- ☆41Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆15Updated 4 years ago
- ☆30Updated last month
- ☆24Updated 10 months ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 6 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ☆11Updated 5 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆18Updated 2 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆42Updated 4 years ago
- ☆29Updated 10 months ago
- WinAFL modified for RDP client fuzzing☆19Updated 2 years ago
- 动态二进制插桩框架DynamoRIO通过将程序代码进行反复插桩(Instrumentation)执行构建了源程序代码与操纵代码之间的桥梁,使DynamoRIO的客户端编写者能够在更高的层面上驾驭原有的程序代码.虽然程序的载体还是被编译成原生的汇编指令集执行,但是不管是原生代…☆32Updated 2 years ago
- A list of data-only attacks☆19Updated 6 months ago