compsec-snu / petalLinks
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)
☆12Updated 7 months ago
Alternatives and similar repositories for petal
Users that are interested in petal are comparing it to the libraries listed below
Sorting:
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago
- ☆13Updated last year
- ☆34Updated 2 years ago
- ☆36Updated last year
- Official repository of SyzRisk [ASIA CCS'24]☆12Updated 10 months ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 8 months ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 2 weeks ago
- ☆24Updated 2 months ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated last year
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 8 months ago
- ☆31Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆30Updated 3 years ago
- ViDeZZo source code.☆35Updated 2 months ago
- ☆19Updated 2 weeks ago
- ☆55Updated last year
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆42Updated 11 months ago
- ☆24Updated last month
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 7 months ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last year
- ☆31Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆34Updated last year
- ☆35Updated 3 years ago
- ☆39Updated 4 years ago
- ☆45Updated 2 weeks ago
- ☆27Updated 2 years ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆15Updated 2 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆21Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆79Updated 2 weeks ago
- ☆13Updated 3 years ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆17Updated 4 months ago