kevinkoo001 / CCRView external linksLinks
Compiler-assisted Code Randomization (CCR) Toolchain
☆66Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for CCR
Users that are interested in CCR are comparing it to the libraries listed below
Sorting:
- ☆25Oct 4, 2018Updated 7 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 6 years ago
- ☆144Oct 26, 2024Updated last year
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆24Nov 16, 2023Updated 2 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆102Apr 20, 2024Updated last year
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆141Sep 19, 2018Updated 7 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- ☆39Feb 6, 2021Updated 5 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- A static binary rewriter that does not use heuristics☆308May 17, 2018Updated 7 years ago
- LCTF 2018 Platform☆16Oct 3, 2023Updated 2 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- ☆67May 5, 2021Updated 4 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- GitHub Cloner & Compiler☆76Sep 24, 2021Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆32Nov 29, 2022Updated 3 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago