seclab-fudan / PDiff
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PDiff
- Source-binary patch presence test system.☆82Updated 2 years ago
- ☆54Updated 6 months ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- ☆18Updated 6 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 4 years ago
- ☆46Updated 2 years ago
- ☆33Updated last year
- Run fuzzing experiments in Docker☆30Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- implementing collafl☆25Updated 4 years ago
- Source code release for the KRace project☆27Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated 11 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆62Updated 2 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 5 years ago
- ☆44Updated 4 years ago
- ☆22Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆72Updated 2 years ago
- ☆44Updated 2 years ago
- ☆70Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆59Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 5 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 5 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- ☆24Updated 2 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆71Updated 2 years ago