trailofbits / clang-cfi-showcase
Sample programs that illustrate how to use control flow integrity with the clang compiler
☆105Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for clang-cfi-showcase
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 7 years ago
- A patched version of VEX to work with PyVEX.☆105Updated 2 months ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆55Updated 2 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- ☆63Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆58Updated 2 years ago
- Utilities for generating dynamic traces☆88Updated 2 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- K-Miner☆72Updated 5 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- MCFI/PICFI tool chain☆42Updated 8 months ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆93Updated 3 months ago
- A taint-tracking plugin for the Valgrind memory checking tool☆250Updated last year
- Fast and efficient binary translator☆58Updated 5 years ago
- ☆56Updated 4 years ago
- ☆95Updated 5 years ago
- A linux system call fuzzer using TriforceAFL☆171Updated 8 months ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- ☆63Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆129Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- ☆64Updated 5 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 4 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 8 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago