zhilongwang / TaintAnalysisWithPin
Taint analysis with pin tool.
☆9Updated 4 years ago
Alternatives and similar repositories for TaintAnalysisWithPin:
Users that are interested in TaintAnalysisWithPin are comparing it to the libraries listed below
- ☆44Updated 2 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- ☆39Updated 4 years ago
- ☆71Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- ☆44Updated 4 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 7 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Implementation of Polymorphic Canaries.☆9Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆44Updated 7 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 10 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆28Updated last year
- Stony Brook University CFI library☆21Updated 10 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- K-Miner☆75Updated 5 years ago
- ☆24Updated 6 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- ☆26Updated 9 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- ☆10Updated 6 years ago
- MCFI/PICFI tool chain☆42Updated last year
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 3 months ago