intrinsic-propensity / turing-machine
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆76Updated 2 years ago
Related projects: ⓘ
- ☆77Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆150Updated 7 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆32Updated this week
- Attempts at fuzzing Python unpicklers☆36Updated 5 months ago
- ☆109Updated last year
- CodeHawk Abstract Interpretation Engine and Analyzers☆54Updated this week
- ☆28Updated 2 years ago
- Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.☆21Updated 2 years ago
- GIF displaying its own MD5 (hashquine)☆75Updated 4 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- ☆111Updated last year
- MIT's abstract interpretation class taught by Cousot☆36Updated 9 years ago
- Binary patching framework for Linux kernels☆45Updated 5 years ago
- VSCode extension for the LLVM IR language☆58Updated 3 months ago
- The public release of LeftoverLocals code☆62Updated 8 months ago
- ☆92Updated 11 months ago
- How fast can we brute force a 64-bit comparison?☆52Updated 4 years ago
- ☆35Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated 9 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆29Updated 7 months ago
- Some experiments with SMT solvers and GIMPLE IR☆56Updated last week
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆36Updated 4 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆184Updated last year
- The CRISPR static binary patcher☆37Updated 3 years ago
- Processor fuzzer targeting the Armv8-A ISA☆55Updated last year
- Assembly super-optimization via constraint solving☆156Updated this week
- Unicorn: Symbolic Execution, Bounded Model Checking, and Code Optimization of RISC-V Code using Classical Solvers and Quantum Computers☆29Updated last month
- XZ backdoor reverse engineering☆90Updated last month
- C and C++ compiler frontend using PASTA to parse code, and VAST to represent the code as MLIR.☆39Updated last month
- Verification of BPF JIT compilers☆54Updated last year