secure-foundations / provably-safe-sandboxing-wasm-usenix22Links
Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"
☆38Updated 3 years ago
Alternatives and similar repositories for provably-safe-sandboxing-wasm-usenix22
Users that are interested in provably-safe-sandboxing-wasm-usenix22 are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- ☆62Updated 2 years ago
- A native symbolic execution engine for WebAssembly☆49Updated last year
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆26Updated last year
- Greybox Fuzzing of Distributed Systems (CCS'23)☆56Updated last year
- A high-performance, parallel, compilation-based symbolic execution engine☆142Updated last week
- ☆34Updated 3 years ago
- ☆38Updated 3 years ago
- ☆79Updated 3 years ago
- Automatic detection of speculative information flows☆72Updated 4 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year
- Thesis code☆26Updated 2 years ago
- ☆14Updated 5 years ago
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆164Updated last week
- Concurrency Paper☆113Updated 2 years ago
- ☆27Updated 3 years ago
- An approximate solver for concolic execution☆19Updated 6 months ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆67Updated 8 months ago
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 6 years ago
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆17Updated 7 months ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 6 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆233Updated 3 years ago
- ☆27Updated 2 years ago
- ☆13Updated 3 months ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆45Updated 4 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated last year
- Public-facing course info for program analysis materials.☆43Updated last week
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆17Updated this week
- Verification of BPF JIT compilers☆57Updated 2 years ago
- A framework for testing compilers' type checkers☆60Updated last year