PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)
☆16Nov 4, 2024Updated last year
Alternatives and similar repositories for petal
Users that are interested in petal are comparing it to the libraries listed below
Sorting:
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Mar 26, 2025Updated 11 months ago
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆14May 11, 2021Updated 4 years ago
- ☆16Aug 19, 2024Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Nov 25, 2024Updated last year
- ☆12Mar 25, 2020Updated 5 years ago
- ☆27Oct 15, 2025Updated 4 months ago
- ☆25Mar 26, 2025Updated 11 months ago
- ☆20Dec 4, 2023Updated 2 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 8 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- a paper template☆59Aug 4, 2025Updated 7 months ago
- ☆32Apr 2, 2024Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Jun 16, 2024Updated last year
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- A tool for automatically identifying syscall-guard variables☆37Feb 10, 2026Updated 3 weeks ago
- ☆34Jun 5, 2023Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- ☆40Jan 5, 2026Updated 2 months ago
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- ☆11Nov 7, 2025Updated 3 months ago
- ☆34Nov 7, 2022Updated 3 years ago
- Flow Integrity Deterministic Enforcement System. Mechanisms for securing AI agents with information-flow control.☆78May 30, 2025Updated 9 months ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- ☆37Nov 9, 2025Updated 3 months ago
- CCS Tools☆13Sep 4, 2023Updated 2 years ago
- A POC for a mutual fund listing app with a user signup/signin flow that displays multiple mutual funds in a scrollable list. Certain esse…☆10Feb 1, 2023Updated 3 years ago
- ☆102May 27, 2024Updated last year
- ☆15Mar 20, 2017Updated 8 years ago
- Deploy the marketing analytics application, CRMint☆14Feb 24, 2026Updated last week
- ☆14Nov 11, 2025Updated 3 months ago
- Resources for rcs ccs and dubtrack css☆12Jun 11, 2018Updated 7 years ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- ☆14Mar 9, 2025Updated 11 months ago
- ☆14Mar 10, 2025Updated 11 months ago
- ☆13Mar 19, 2022Updated 3 years ago
- Code for "The Whole Truth and Nothing But the Truth: Faithful and Controllable Dialogue Response Generation with Dataflow Transduction an…☆11Apr 30, 2024Updated last year
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- Repo que almacena todas las clases.☆21Jan 14, 2026Updated last month