seclab-fudan / PDiffLinks
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
☆13Updated 5 years ago
Alternatives and similar repositories for PDiff
Users that are interested in PDiff are comparing it to the libraries listed below
Sorting:
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆56Updated last year
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆37Updated 2 weeks ago
- ☆46Updated 3 years ago
- cinspector - a static C source code analysis framework☆28Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆46Updated 2 years ago
- ☆26Updated last year
- ☆74Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆82Updated 9 months ago
- Detect missing check bugs in OS kernels☆111Updated 2 years ago
- We hinder fuzzing☆68Updated 3 years ago
- ☆65Updated 6 years ago
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- Source code release for the KRace project☆29Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated 3 weeks ago
- ☆36Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆97Updated last month
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- BigMAC: Analysis tool to introspect and query Android security policies.☆39Updated 2 years ago
- FANS: Fuzzing Android Native System Services☆261Updated 5 years ago
- ☆34Updated 4 years ago
- ☆19Updated 7 years ago
- implementing collafl☆26Updated 5 years ago
- Symbolic Execution Over Processor Traces☆124Updated last year
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- K-Miner☆75Updated 6 years ago