The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
☆20Apr 30, 2022Updated 3 years ago
Alternatives and similar repositories for jitrop-native
Users that are interested in jitrop-native are comparing it to the libraries listed below
Sorting:
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- ☆37May 19, 2023Updated 2 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- CDCL(Crypto) SAT solver for cryptanalysis problems☆11Mar 5, 2021Updated 4 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Public repository of the UCSC CMPE220 class project☆10Oct 8, 2017Updated 8 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- A simple 8086-CPU simulator using Verilog and Quartus II☆10Jul 9, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Aug 12, 2016Updated 9 years ago
- ☆18Feb 11, 2026Updated 3 weeks ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- PNG library benchmarking and testing utility☆11May 16, 2023Updated 2 years ago
- An experimental modular OS written in Rust.☆12Jul 19, 2024Updated last year
- Implementation of Semi-AE-Rec (ICONIP 2017)☆11Aug 10, 2018Updated 7 years ago
- 通过内存特征检测frida☆10Nov 5, 2019Updated 6 years ago
- ☆14Dec 1, 2020Updated 5 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- RISCulator is a RISC-V emulator.☆12Aug 18, 2023Updated 2 years ago
- Workshop collections of Firecracker.☆13Aug 2, 2020Updated 5 years ago
- Operating System☆10Jun 14, 2025Updated 8 months ago
- simple ansible playbook to take clean ubuntu 18.04 to CUDA 10, PyTorch 1.0, fastai, miniconda heaven☆12Dec 16, 2018Updated 7 years ago
- IEEE1588v2 Precision Time Protocol implementation☆13Jun 21, 2021Updated 4 years ago
- ☆15Jul 18, 2023Updated 2 years ago
- Hypervisor from scratch in linux☆13May 8, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆12May 15, 2022Updated 3 years ago