pmp-tool / PMP
PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning
☆10Updated 4 years ago
Alternatives and similar repositories for PMP:
Users that are interested in PMP are comparing it to the libraries listed below
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 2 weeks ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- ☆29Updated last year
- Source-binary patch presence test system.☆82Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- A data-flow-guided fuzzer☆111Updated last year
- Source code of MEUZZ fuzzer☆44Updated 3 years ago
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- ☆36Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated last month
- UAF Fuzzing Benchmark☆57Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- ☆44Updated 2 years ago
- ☆60Updated last year
- ☆18Updated last year
- ☆72Updated 3 years ago
- ☆31Updated 3 years ago
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- ☆24Updated 9 months ago
- ☆17Updated last year
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 5 years ago
- ☆29Updated 2 weeks ago
- ☆52Updated 9 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆56Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago