valour01 / arm_disasssembler_study
This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020
☆59Updated last year
Related projects ⓘ
Alternatives and complementary repositories for arm_disasssembler_study
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- ☆46Updated 3 years ago
- Symbolic Execution Over Processor Traces☆116Updated 3 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 6 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆78Updated this week
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- A data-flow-guided fuzzer☆111Updated last year
- K-Miner☆72Updated 5 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆86Updated 2 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆27Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- ☆39Updated 3 years ago
- ☆132Updated 3 weeks ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 5 months ago
- UAF Fuzzing Benchmark☆55Updated 3 years ago
- afl/afl++ with a hierarchical seed scheduler☆57Updated 2 years ago
- ☆38Updated 2 years ago
- ☆44Updated 2 years ago
- ☆64Updated 5 years ago
- source code for savior fuzzer☆126Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆79Updated 3 weeks ago
- A LLVM Sanitizer for Symbolic Tracing☆208Updated 2 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated 11 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆71Updated 2 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆63Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆195Updated 3 years ago