intrinsic-propensity / turing-machineLinks
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆78Updated 3 years ago
Alternatives and similar repositories for turing-machine
Users that are interested in turing-machine are comparing it to the libraries listed below
Sorting:
- Attempts at fuzzing Python unpicklers☆41Updated last year
- ☆117Updated 2 years ago
- GNU/Linux on Apple M1 hardware☆35Updated 3 years ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆45Updated 5 years ago
- Jupyter notebooks for tutorial on the Z3 SMT solver☆166Updated 2 years ago
- ☆78Updated 4 years ago
- Materials from the DEF CON 30 talk on PACMAN☆34Updated 3 years ago
- A stripped-down LLD (LLVM linker)☆30Updated 5 years ago
- Verified, Incremental, Binary Editing with Synthesis☆54Updated 2 years ago
- ☆20Updated 3 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆320Updated 4 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Updated 2 years ago
- A tool for analyzing x86-64 binaries.☆336Updated last year
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- ☆59Updated 2 years ago
- Open source binary analysis tools.☆247Updated last week
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- MIT's abstract interpretation class taught by Cousot☆40Updated 11 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- Official QEMU mirror☆30Updated 4 months ago
- A Python3 Implementation of LLL☆36Updated 4 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- Minimal RarVM Toolchain☆236Updated 10 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- Verification of BPF JIT compilers☆57Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated 2 years ago