salmanyam / jitrop-nativeLinks
The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
☆20Updated 3 years ago
Alternatives and similar repositories for jitrop-native
Users that are interested in jitrop-native are comparing it to the libraries listed below
Sorting:
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆161Updated 3 years ago
- ☆144Updated last year
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆267Updated 11 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆207Updated 4 years ago
- A LLVM Sanitizer for Symbolic Tracing☆228Updated last week
- Source code of ASAN--☆104Updated last year
- ☆69Updated 6 years ago
- We hinder fuzzing☆69Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- Source code release for the KRace project☆30Updated 4 years ago
- ☆76Updated last month
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- K-Miner☆74Updated 6 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆88Updated 2 weeks ago
- ☆17Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Updated 3 years ago
- ☆57Updated last year
- ☆62Updated last month
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆62Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆100Updated 2 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Updated 3 years ago
- ☆29Updated 7 years ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆26Updated 11 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago