embedded-sec / BenchIoTLinks
Security benchmarks for the Internet of Things
☆22Updated 5 years ago
Alternatives and similar repositories for BenchIoT
Users that are interested in BenchIoT are comparing it to the libraries listed below
Sorting:
- Automatic Compartments for Embedded Systems☆24Updated 5 years ago
- ☆41Updated 6 years ago
- ☆24Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- ☆20Updated 7 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Updated last year
- ☆69Updated 6 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆65Updated 3 years ago
- ☆56Updated 3 years ago
- ☆55Updated 5 years ago
- Examples demonstrating the usage of avatar²☆27Updated 2 years ago
- ☆17Updated 6 years ago
- ☆74Updated 6 years ago
- K-Miner☆74Updated 6 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 8 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- ☆27Updated 4 months ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Updated last year
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago
- ☆53Updated 8 years ago
- ☆67Updated 5 years ago
- ☆53Updated 6 years ago
- ☆12Updated 4 years ago
- ☆27Updated 4 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆32Updated 8 years ago
- ☆14Updated 4 years ago