cmu-sei / AASPE
A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform from AADL models.
☆16Updated 6 years ago
Alternatives and similar repositories for AASPE:
Users that are interested in AASPE are comparing it to the libraries listed below
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 8 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 11 months ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆29Updated 8 years ago
- Static Program Analysis for Reliable Trusted Apps☆22Updated 6 years ago
- TRACER Symbolic Execution Tool☆28Updated 4 years ago
- Systematic Protocol Analysis Project☆11Updated 7 years ago
- ☆13Updated 7 years ago
- A(nother) Binary Analysis Framework☆30Updated 10 years ago
- Running BoringSSL tests against OpenSSL☆14Updated 3 years ago
- ☆22Updated 7 years ago
- Open Source Network Security Platform☆40Updated 15 years ago
- Raw socket utilities for 802.11p transmission☆9Updated 9 years ago
- Generic server for collaborative code analysis☆12Updated 8 years ago
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆15Updated 2 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last week
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆36Updated 4 years ago
- ☆24Updated 9 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Updated 10 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Updated 8 years ago
- Base OpenXT build scripts☆49Updated 3 years ago
- Measure branching along code paths☆20Updated 8 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 9 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Simplified version of flashrom for installing new system firmware☆19Updated last year