salmanyam / jitrop-nativeLinks
The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
☆20Updated 3 years ago
Alternatives and similar repositories for jitrop-native
Users that are interested in jitrop-native are comparing it to the libraries listed below
Sorting:
- ☆144Updated 9 months ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last month
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 5 months ago
- Source code of ASAN--☆95Updated last year
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated last year
- An awesome & curated list of binary rewriting papers☆248Updated 3 years ago
- ☆72Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- Symbolic Execution Over Processor Traces☆122Updated 11 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 6 months ago
- A data-flow-guided fuzzer☆122Updated last year
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆105Updated 3 months ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated 3 weeks ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- We hinder fuzzing☆68Updated 3 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆214Updated 4 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆352Updated 3 months ago
- ☆29Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- A grammar-based custom mutator for AFL++☆256Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- ☆86Updated 9 months ago
- Source code release for the KRace project☆29Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 8 months ago