cmu-sei / AASPE
A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform from AADL models.
☆16Updated 6 years ago
Alternatives and similar repositories for AASPE:
Users that are interested in AASPE are comparing it to the libraries listed below
- SEI GitHub landing page.☆12Updated 3 months ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- TRACER Symbolic Execution Tool☆28Updated 4 years ago
- Static Program Analysis for Reliable Trusted Apps☆23Updated 6 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last month
- Systematic Protocol Analysis Project☆11Updated 7 years ago
- A(nother) Binary Analysis Framework☆30Updated 10 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Updated 10 years ago
- Measure branching along code paths☆20Updated 8 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆29Updated 8 years ago
- Modular Provable Security on Commodity System and Application Software Stacks☆13Updated 3 years ago
- ☆13Updated 7 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- ☆24Updated 9 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 11 years ago
- Running BoringSSL tests against OpenSSL☆14Updated 3 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Java fuzz testing library for implementations of ABNF rules such as IETF RFCs☆33Updated 6 months ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- ☆22Updated 7 years ago
- Architectural Framework For Integrated Refinement Modeling☆11Updated 7 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago
- VTable Hijacking Protection for Binaries☆11Updated 8 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- Lightweight Symbolic Execution Engine☆22Updated 9 years ago
- Generic server for collaborative code analysis☆12Updated 8 years ago
- ☆10Updated 4 years ago
- Tools created for the DARPA Cyber Grand Challenge that visualize software execution based on traces generated by the CGC Monitor and a Un…☆14Updated 6 years ago