teesec-research / optee_examples
OP-TEE Trusted Applications vulnerable to memory corruption bugs.
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for optee_examples
- Automatic Compartments for Embedded Systems☆24Updated 4 years ago
- In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication☆12Updated last year
- ☆17Updated 5 years ago
- ☆64Updated 5 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆34Updated last week
- ☆31Updated 4 years ago
- ☆50Updated 5 years ago
- ☆46Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆57Updated last year
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- ☆24Updated 2 years ago
- ☆11Updated 3 years ago
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ☆53Updated 6 months ago
- The published code repo for the Cortex-M SoK paper.☆16Updated 5 months ago
- Security benchmarks for the Internet of Things☆23Updated 4 years ago
- ☆18Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- ☆33Updated last year
- ☆22Updated 4 years ago
- ☆68Updated 4 years ago
- ☆43Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- UAF Fuzzing Benchmark☆55Updated 3 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 5 years ago
- Directed fuzzing framework for gVisor.☆23Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- Resources accompanying the LibAFL workshop blog post☆15Updated last month
- ☆26Updated 3 years ago