gatelabdavis / RANELinks
☆23Updated 2 years ago
Alternatives and similar repositories for RANE
Users that are interested in RANE are comparing it to the libraries listed below
Sorting:
- Program synthesis tools and utilities for LLVM.☆20Updated 2 years ago
- Synthesis of loop-free programs☆19Updated last week
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆19Updated last year
- E-morphic: Scalable Equality Saturation for Structural Exploration in Logic Synthesis (DAC2025)☆20Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆50Updated 3 months ago
- This is an implemention of Lee-Moore's Shortest Path Maze Router with multi-sink nets support.☆13Updated 9 years ago
- binary->LLVM->circuits☆19Updated last year
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 2 years ago
- ☆16Updated 4 years ago
- fast probabilistic symmetry detection on graphs☆15Updated 2 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆62Updated last year
- Solving floating point SMT constraints on a GPU☆49Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated 2 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Updated 9 months ago
- ☆17Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆22Updated 2 years ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆17Updated 2 years ago
- A satisfiability solver for (existential) bit-vector formulas based on the mcSAT framework.☆21Updated 2 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- DMA attacks over PCI Express based on Xilinx Zynq-7000 series SoC☆65Updated 4 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆25Updated 5 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17Updated 7 years ago
- SLOT: SMT-LLVM Optimizing Translation☆60Updated 4 months ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆36Updated 2 years ago
- Hardware-Assisted Process Tracer for Fuzzing on ARM64 Linux☆26Updated 2 years ago
- VSCode extension for the LLVM IR language☆61Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated this week
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Updated 4 years ago