cssl-unist / trust-sec23Links
☆8Updated 9 months ago
Alternatives and similar repositories for trust-sec23
Users that are interested in trust-sec23 are comparing it to the libraries listed below
Sorting:
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆42Updated last year
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- ☆11Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 5 months ago
- Static Analysis Course☆73Updated this week
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆80Updated last month
- ☆36Updated last month
- Recent symbolic execution papers and tools.☆169Updated 2 months ago
- 20 benchmark programs☆48Updated 4 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 10 months ago
- ☆34Updated 2 years ago
- Detect missing check bugs in OS kernels☆110Updated last year
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆317Updated last month
- ☆11Updated last month
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆95Updated last week
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated last month
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆96Updated last year
- AFLTurbo☆29Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Anderson points-to analysis implementation based on LLVM☆12Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 5 years ago
- ☆57Updated 2 years ago
- Lifting network implementation to precise format specification☆24Updated 3 months ago
- ☆24Updated 3 months ago
- ☆70Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- Source code of ASAN--☆95Updated last year
- ☆24Updated last week
- ☆41Updated 2 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 8 months ago