☆37May 19, 2023Updated 2 years ago
Alternatives and similar repositories for typm
Users that are interested in typm are comparing it to the libraries listed below
Sorting:
- ☆25Oct 4, 2018Updated 7 years ago
- ☆11Feb 2, 2024Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- A Hybrid Alias Analysis☆19Aug 10, 2023Updated 2 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 3 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61May 16, 2025Updated 9 months ago
- ☆20Mar 10, 2022Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated 10 months ago
- Compartmentalised monolithic library OS☆20Jul 15, 2021Updated 4 years ago
- Pre-built bitcode files for the Linux kernel☆22Sep 18, 2019Updated 6 years ago
- ☆35Feb 4, 2026Updated 3 weeks ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- ☆74Dec 5, 2019Updated 6 years ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆27Oct 15, 2022Updated 3 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Source code of ASAN--☆104Jun 18, 2024Updated last year
- ☆29Jul 4, 2018Updated 7 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Experimental encrypted file system using SGX and FUSE☆12Oct 9, 2018Updated 7 years ago
- Rust and C Benchmarks☆14Nov 21, 2024Updated last year
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- ☆13Mar 20, 2025Updated 11 months ago