intrinsic-propensity / turing-machine
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆77Updated 2 years ago
Alternatives and similar repositories for turing-machine:
Users that are interested in turing-machine are comparing it to the libraries listed below
- ☆78Updated 3 years ago
- Automatic Binary Parallelisation☆38Updated last year
- ☆112Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆32Updated 11 months ago
- Little Kernel for Hyper-V arm64 Guest☆31Updated 3 years ago
- Attempts at fuzzing Python unpicklers☆37Updated 10 months ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆40Updated 4 years ago
- AFL++ with support for FormatFuzzer☆12Updated 2 years ago
- ☆29Updated 3 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- MIT's abstract interpretation class taught by Cousot☆39Updated 10 years ago
- Jupyter notebooks for tutorial on the Z3 SMT solver☆158Updated last year
- Source code for GpuShareSat, a library for SAT solvers to use the GPU for clause sharing between CPU threads.☆32Updated 3 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- Ditto.☆17Updated 4 years ago
- Solving floating point SMT constraints on a GPU☆48Updated 4 years ago
- The axiom profiler for exploring and visualizing SMT solver quantifier instantiations (made via E-matching).☆32Updated 2 weeks ago
- RISC-V ISA processor module for IDAPro 7.x☆30Updated 4 years ago
- VSCode extension for the LLVM IR language☆59Updated 8 months ago
- Fork of LLVM for demonstrating optimization pass development☆30Updated last year
- A system call interception tool☆54Updated last month
- XZ backdoor reverse engineering☆91Updated 5 months ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 3 years ago
- Some experiments with SMT solvers and GIMPLE IR☆72Updated this week
- Ghidra P-Code emulation and static LLVM lifting in Python☆30Updated 2 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆24Updated 4 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆317Updated 3 years ago
- PoC for PixieFail vulnerabilities☆21Updated last year