intrinsic-propensity / turing-machine
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆76Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for turing-machine
- Little Kernel for Hyper-V arm64 Guest☆30Updated 2 years ago
- Verification of BPF JIT compilers☆54Updated last year
- A system call interception tool☆53Updated last year
- Attempts at fuzzing Python unpicklers☆37Updated 8 months ago
- PoC for PixieFail vulnerabilities☆20Updated 10 months ago
- ☆109Updated last year
- Slides from Public Talks☆18Updated 3 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆40Updated 4 years ago
- Trace a program using CPU tracer technology.☆27Updated 2 years ago
- ☆29Updated 2 years ago
- ☆56Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated 11 months ago
- Pure Python Itanium C++ ABI demangler☆34Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 4 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆29Updated 5 years ago
- Verified, Incremental, Binary Editing with Synthesis☆51Updated last year
- Ditto.☆16Updated 4 years ago
- Solving floating point SMT constraints on a GPU☆48Updated 3 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 4 years ago
- A stripped-down LLD (LLVM linker)☆29Updated 4 years ago
- Rewriting functions in compiled binaries using McSema☆87Updated 5 years ago
- Symbolic Execution over Falcon IL☆28Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆48Updated 3 months ago
- ☆81Updated 2 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆32Updated this week
- GNU/Linux on Apple M1 hardware☆35Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆74Updated 2 years ago
- Processor fuzzer targeting the Armv8-A ISA☆55Updated last year
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 4 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆25Updated this week