season-lab / sok-dbi-security
Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)"
☆22Updated 5 years ago
Alternatives and similar repositories for sok-dbi-security:
Users that are interested in sok-dbi-security are comparing it to the libraries listed below
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Collection of DBI evasion techniques☆14Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- ☆24Updated 9 months ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- ☆52Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- Measure Basic Blocks coverage of all testcases in the AFL queue using a patched QEMU☆22Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- ☆36Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- ☆20Updated 3 years ago
- The toolchain of Chosen-instruction attack☆18Updated 2 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated 11 months ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- A fuzzer setup to fuzz libc functions.☆15Updated 2 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- kAFL Fuzzer☆33Updated 5 months ago
- ☆41Updated 2 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆11Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year