This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆38Nov 14, 2024Updated last year
Alternatives and similar repositories for temporal-specialization
Users that are interested in temporal-specialization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆70May 3, 2022Updated 3 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆48Nov 15, 2021Updated 4 years ago
- Pre-built bitcode files for the Linux kernel☆22Sep 18, 2019Updated 6 years ago
- ☆35Feb 4, 2026Updated last month
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- ☆37May 19, 2023Updated 2 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆79Dec 30, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 6 months ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 2 months ago
- ☆28Nov 16, 2021Updated 4 years ago
- The published code repo for the Cortex-M SoK paper.☆28Feb 5, 2026Updated last month
- ☆14Oct 27, 2021Updated 4 years ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆169Dec 4, 2025Updated 3 months ago
- ☆23Nov 16, 2023Updated 2 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Nov 17, 2021Updated 4 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆29Apr 15, 2023Updated 2 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- ☆42Oct 26, 2022Updated 3 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago