cmu-sei / AASPE
A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform from AADL models.
☆16Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for AASPE
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆28Updated 8 years ago
- Generic server for collaborative code analysis☆12Updated 7 years ago
- A(nother) Binary Analysis Framework☆30Updated 10 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆18Updated 6 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Updated 10 years ago
- Systematic Protocol Analysis Project☆11Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Program Chair's Website for CCS 2017☆12Updated 2 years ago
- OSS-Fuzz - continuous fuzzing of open source software☆11Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆37Updated 9 months ago
- ☆13Updated 7 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Heap analysis tooling for mempool☆12Updated 2 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Updated 7 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 11 years ago
- DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurit…☆40Updated 3 months ago
- ☆24Updated 9 years ago
- ☆33Updated 5 years ago
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆15Updated 2 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 9 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago