intel / xom-switchLinks
☆55Updated 2 years ago
Alternatives and similar repositories for xom-switch
Users that are interested in xom-switch are comparing it to the libraries listed below
Sorting:
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- MCFI/PICFI tool chain☆43Updated last year
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- ☆64Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ☆55Updated 5 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 8 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆41Updated 4 years ago
- ☆72Updated 5 years ago
- ☆37Updated 3 years ago
- ☆53Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 4 years ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆17Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- CRETE under development☆59Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated 3 weeks ago
- ☆96Updated 6 years ago
- ☆24Updated 6 years ago
- ☆36Updated 4 years ago