shamedgh / temporal-specializationLinks
This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆37Updated 11 months ago
Alternatives and similar repositories for temporal-specialization
Users that are interested in temporal-specialization are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- ☆36Updated 2 years ago
- K-Miner☆75Updated 6 years ago
- ☆61Updated 3 years ago
- Source code of ASAN--☆100Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- ☆46Updated 3 years ago
- git://g.csail.mit.edu/kint☆51Updated 12 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- ☆65Updated 6 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- ☆17Updated 6 years ago
- ☆18Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- ☆37Updated 3 years ago
- Detect missing check bugs in OS kernels☆111Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated last year
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆170Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 10 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆84Updated last month
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 9 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆15Updated 5 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated 2 years ago