dennisaa / patharmor
PathArmor context-sensitive CFI implementation
☆45Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for patharmor
- MCFI/PICFI tool chain☆42Updated 8 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- ☆55Updated 2 years ago
- ☆67Updated 4 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- ☆25Updated 9 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆35Updated 8 years ago
- ☆56Updated 4 years ago
- Utilities for generating dynamic traces☆88Updated 2 years ago
- CRETE under development☆58Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆58Updated 2 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 7 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- ☆95Updated 5 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- ☆50Updated 5 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆24Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- K-Miner☆72Updated 5 years ago
- CRAX: software CRash analysis for Automatic eXploit generation☆49Updated 9 years ago
- ☆27Updated 6 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆25Updated 6 years ago