shamedgh / temporal-specializationLinks
This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆37Updated 9 months ago
Alternatives and similar repositories for temporal-specialization
Users that are interested in temporal-specialization are comparing it to the libraries listed below
Sorting:
- ☆13Updated 3 years ago
- K-Miner☆75Updated 6 years ago
- ☆34Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- Source code of ASAN--☆96Updated last year
- ☆61Updated 3 years ago
- ☆46Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆170Updated 3 years ago
- ☆17Updated 5 years ago
- ☆18Updated last year
- Detect missing check bugs in OS kernels☆110Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 11 months ago
- git://g.csail.mit.edu/kint☆50Updated 11 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 3 years ago
- ☆65Updated 6 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆83Updated 2 months ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆31Updated 3 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- ☆24Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- Onsite Analysis Infrastructure☆16Updated 5 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 7 months ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 8 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆157Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- ☆72Updated 3 years ago