Compiler-assisted Code Randomization (CCR) Toolchain
☆67Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for CCR
Users that are interested in CCR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Oct 4, 2018Updated 7 years ago
- ☆148Oct 26, 2024Updated last year
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆142Sep 19, 2018Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 9 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆20Dec 19, 2019Updated 6 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- Rust and C Benchmarks☆14Nov 21, 2024Updated last year
- ☆25Jun 16, 2021Updated 4 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Apr 20, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- GitHub Cloner & Compiler☆75Sep 24, 2021Updated 4 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- evolution of extant software☆24Jan 24, 2018Updated 8 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- ☆37Feb 4, 2026Updated 2 months ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆68May 5, 2021Updated 4 years ago
- BinTuner☆67Jul 25, 2022Updated 3 years ago
- Self-hosting binary instrumentation framework for security research☆225Aug 1, 2023Updated 2 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- ☆32Nov 29, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago