tandriamil / BrFAST
Browser Fingerprinting Attribute Selection Tool
☆8Updated last year
Alternatives and similar repositories for BrFAST:
Users that are interested in BrFAST are comparing it to the libraries listed below
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆38Updated 2 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- Human-In-The-Loop Automatic Program Repair☆19Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- ☆11Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 2 years ago
- ☆10Updated 4 years ago
- A static deobfuscator for JavaScript Malware☆13Updated 4 years ago
- ☆16Updated last year
- Repo of code for FPStalker article☆32Updated 7 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- Ditto.☆17Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- ☆25Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi …☆14Updated 2 years ago
- ☆10Updated 4 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- A framework for using test case generators to locate errors in C programs☆9Updated 6 years ago
- ☆9Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆21Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago