shamedgh / temporal-specializationLinks
This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆38Updated last year
Alternatives and similar repositories for temporal-specialization
Users that are interested in temporal-specialization are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- ☆37Updated 2 years ago
- ☆61Updated 3 years ago
- K-Miner☆74Updated 6 years ago
- ☆47Updated 4 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- Source code of ASAN--☆104Updated last year
- ☆69Updated 6 years ago
- ☆17Updated 6 years ago
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- Detect missing check bugs in OS kernels☆113Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Updated 3 months ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆89Updated 4 months ago
- ☆76Updated last month
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆63Updated last year
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- ☆23Updated 6 years ago
- git://g.csail.mit.edu/kint☆51Updated 12 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated last year
- Onsite Analysis Infrastructure☆16Updated 5 years ago
- ☆37Updated 3 years ago
- ☆39Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated last year
- ☆108Updated 6 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago