shamedgh / temporal-specialization
This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Reduction" published in the Proceedings of the 29th Usenix Security Symposium (2020).
☆35Updated 3 months ago
Alternatives and similar repositories for temporal-specialization:
Users that are interested in temporal-specialization are comparing it to the libraries listed below
- ☆12Updated 3 years ago
- ☆46Updated 3 years ago
- ☆33Updated last year
- K-Miner☆75Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- ☆17Updated 5 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- ☆64Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆76Updated 3 years ago
- ☆60Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 5 months ago
- ☆37Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 5 years ago
- ☆39Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- ☆16Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ☆22Updated 3 years ago
- Detect missing check bugs in OS kernels☆108Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆28Updated 8 months ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆90Updated 11 months ago
- ☆70Updated 5 years ago
- ☆22Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- ☆71Updated 2 years ago
- A version of Griffin used to provide program traces☆15Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago