pmp-tool / PMP
PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning
☆10Updated 4 years ago
Alternatives and similar repositories for PMP:
Users that are interested in PMP are comparing it to the libraries listed below
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- Symbolic Execution Over Processor Traces☆121Updated 8 months ago
- ☆34Updated last year
- ☆23Updated 7 months ago
- ☆60Updated last year
- ☆36Updated 4 years ago
- ☆56Updated 3 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- ☆18Updated 2 years ago
- angr's exploration technique to perform taint analysis☆61Updated 5 years ago
- ☆44Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 3 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Source code release for the KRace project☆28Updated 3 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Updated 6 years ago
- Full implementaion of Genius☆31Updated last year
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆29Updated last year
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 5 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- ☆34Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- ☆33Updated 3 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆99Updated last week
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- ☆23Updated 3 weeks ago
- ☆27Updated 3 years ago
- ☆54Updated 11 months ago
- ☆27Updated 2 years ago