shamedgh / temporal-specializationLinks
This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆38Updated last year
Alternatives and similar repositories for temporal-specialization
Users that are interested in temporal-specialization are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- ☆37Updated 2 years ago
- K-Miner☆74Updated 6 years ago
- ☆47Updated 4 years ago
- ☆69Updated 6 years ago
- ☆61Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- Detect missing check bugs in OS kernels☆113Updated 2 years ago
- ☆17Updated 6 years ago
- Source code of ASAN--☆103Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated 2 months ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Updated 3 years ago
- ☆18Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆88Updated 4 months ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated last year
- ☆23Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated last year
- git://g.csail.mit.edu/kint☆51Updated 12 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 6 years ago
- ☆37Updated 3 years ago
- ☆57Updated last year
- ☆76Updated 3 weeks ago
- ☆32Updated 7 months ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Updated 4 years ago