Securing Embedded Systems with Return Address Integrity
☆15Aug 19, 2024Updated last year
Alternatives and similar repositories for uRAI
Users that are interested in uRAI are comparing it to the libraries listed below
Sorting:
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Lists of must-read papers (mainly security papers)☆32Sep 18, 2024Updated last year
- ☆67May 5, 2021Updated 4 years ago
- ☆36Apr 26, 2023Updated 2 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆37Aug 17, 2023Updated 2 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- Tokio-based streaming API for UDP + DTLS sessions☆11Apr 11, 2024Updated last year
- Trophy case for Rudra bugs.☆40Feb 12, 2024Updated 2 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Jan 1, 2019Updated 7 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- -☆11Dec 18, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- enumerating git status☆11Jun 10, 2024Updated last year
- ☆12Apr 22, 2023Updated 2 years ago
- Ten Thousand Failures Blog☆12Jul 22, 2014Updated 11 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- A CLI client in place of WhatsApp-Web☆10Feb 3, 2023Updated 3 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago
- ☆39Dec 24, 2023Updated 2 years ago
- ☆12Sep 22, 2020Updated 5 years ago
- ☆11May 7, 2018Updated 7 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago