cla7aye15I4nd / CAMPLinks
CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) β¨ Please give a star to https://github.com/cla7aye15I4nd/shadowbound next door! ππ
β42Updated 11 months ago
Alternatives and similar repositories for CAMP
Users that are interested in CAMP are comparing it to the libraries listed below
Sorting:
- Precise and high-order static points-to/taint analysis based on LLVM IR.β80Updated last month
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targetsβ95Updated last year
- Static Analysis Courseβ73Updated last week
- β34Updated 2 years ago
- Source code of ASAN--β95Updated last year
- β36Updated last year
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulationβ61Updated 7 months ago
- β24Updated 2 months ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernelβ20Updated 2 weeks ago
- Bug detection framework for finding Finger tracable bugs in Linuxβ22Updated 3 months ago
- β57Updated last year
- β36Updated 2 weeks ago
- Source code release for the KRace projectβ28Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernelβ76Updated 3 years ago
- Detect missing check bugs in OS kernelsβ110Updated last year
- A LLVM Sanitizer for Symbolic Tracingβ223Updated this week
- β24Updated 2 months ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)β¦β23Updated 11 months ago
- β27Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzingβ96Updated last year
- β17Updated 3 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)β60Updated last month
- β72Updated 2 years ago
- β35Updated 3 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"β55Updated 4 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Redβ¦β37Updated 7 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugsβ44Updated 5 years ago
- β11Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysisβ29Updated last year
- β68Updated last year