☆25Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for sanitizing-for-security-benchmarks
Users that are interested in sanitizing-for-security-benchmarks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37May 19, 2023Updated 2 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆56Jun 6, 2021Updated 4 years ago
- An extendable and flexible infrastructure for program instrumentation.☆26Feb 19, 2026Updated last month
- ☆14Oct 11, 2017Updated 8 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- 20 benchmark programs☆52Mar 17, 2021Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- Compartmentalised monolithic library OS☆21Jul 15, 2021Updated 4 years ago
- ☆26May 10, 2021Updated 4 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆142Sep 19, 2018Updated 7 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- ☆22Nov 12, 2020Updated 5 years ago
- ☆18May 1, 2020Updated 5 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- ☆20Dec 18, 2018Updated 7 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- CoREBench: Errors in Find, Grep, Make☆13Dec 10, 2015Updated 10 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆13Oct 6, 2024Updated last year
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- ☆27Sep 5, 2025Updated 6 months ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago