intrinsic-propensity / turing-machineLinks
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆78Updated 3 years ago
Alternatives and similar repositories for turing-machine
Users that are interested in turing-machine are comparing it to the libraries listed below
Sorting:
- ☆118Updated 2 years ago
- Attempts at fuzzing Python unpicklers☆41Updated last year
- Docs and resources on CPU Speculative Execution bugs☆376Updated 8 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- GIF displaying its own MD5 (hashquine)☆76Updated 5 years ago
- Ditto.☆18Updated 5 years ago
- ☆78Updated 4 years ago
- Verification of BPF JIT compilers☆58Updated 2 years ago
- An IOKit kext designed for microarchitectural security research on M1☆46Updated 3 years ago
- Jupyter notebooks for tutorial on the Z3 SMT solver☆165Updated 2 years ago
- A decompiler for GHC-compiled Haskell☆108Updated 7 years ago
- MIT's abstract interpretation class taught by Cousot☆40Updated 11 years ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- ☆24Updated 5 years ago
- ☆20Updated 3 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- A tool for analyzing x86-64 binaries.☆337Updated last year
- GNU/Linux on Apple M1 hardware☆35Updated 3 years ago
- Materials from the DEF CON 30 talk on PACMAN☆34Updated 3 years ago
- Binary patching framework for Linux kernels☆48Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆90Updated 4 years ago
- Open source binary analysis tools.☆248Updated this week
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆44Updated 5 years ago
- Program Analisys and Transformation survey and links (particular focus on SSA)☆172Updated 4 years ago
- Stub example hypervisor for AArch64 intended to allow other hypervisors to become resident later☆21Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- A stripped-down LLD (LLVM linker)☆30Updated 5 years ago
- A differential fuzzer for x86 decoders☆260Updated last year
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆321Updated 4 years ago