pagabuc / kernographerLinks
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)
☆13Updated 6 years ago
Alternatives and similar repositories for kernographer
Users that are interested in kernographer are comparing it to the libraries listed below
Sorting:
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- PoC for the taint-based ROP approach☆14Updated 2 years ago
- Concolic Execution Fuzzer☆24Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 3 years ago
- ☆17Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆28Updated last year
- MIPS32 emulation fuzzing☆12Updated 4 years ago
- ☆53Updated 6 years ago
- ☆24Updated 7 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 10 months ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 6 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- ☆14Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆14Updated 6 years ago
- Examples demonstrating the usage of avatar²☆27Updated last year
- An extendable and flexible infrastructure for program instrumentation.☆22Updated last month
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆12Updated 3 years ago
- ☆12Updated 4 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago