☆42Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for UBITect
Users that are interested in UBITect are comparing it to the libraries listed below
Sorting:
- ☆14Oct 11, 2017Updated 8 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- ☆47Nov 15, 2021Updated 4 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆337Apr 30, 2022Updated 3 years ago
- ☆22Apr 17, 2023Updated 2 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆79Dec 30, 2021Updated 4 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆26Dec 3, 2015Updated 10 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- Efficient Sampling of SAT Solutions for Testing☆35Sep 20, 2019Updated 6 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- ☆21Nov 10, 2019Updated 6 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- KLEE / CSE Project☆48Apr 3, 2020Updated 5 years ago
- ☆24Aug 24, 2025Updated 6 months ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆29Jul 7, 2021Updated 4 years ago
- Pointer Analysis with Tunable Precision☆28Mar 23, 2016Updated 9 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- ☆14Jun 18, 2023Updated 2 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- A Fast Floating-Point Satisfiability Solver☆28Jul 26, 2025Updated 7 months ago
- ☆58May 10, 2024Updated last year
- Infrastructure for Reassembleable Disassembling and Transformation☆213Feb 22, 2026Updated last week
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Metal: Learning a Meta-Solver for Syntax-Guided Program Synthesis☆15Feb 18, 2019Updated 7 years ago
- ☆37Jun 23, 2025Updated 8 months ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆41Sep 29, 2023Updated 2 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆225Jul 2, 2025Updated 8 months ago
- ☆15Sep 7, 2020Updated 5 years ago