世界很暗,但是你来了
SymQEMU_Compilation-based symbolic execution for binaries SymQEMU_Compilation-based symbolic execution for binaries
https://www.anquanke.com/post/id/231413#h3-6 Introduction符号执行被认为是一种高效但昂贵的探索程序的技术。它通常与模糊测试(所谓的混合模糊测试)相结合,其中 fuzzer 利用启发式来
2023-11-18
Symbolic execution with SYMCC_Don’t interpret, compile! Symbolic execution with SYMCC_Don’t interpret, compile!
源码:http://www.s3.eurecom.fr/tools/symbolic_execution/symcc.html 总结:https://zhuanlan.zhihu.com/p/599054963 Introduction符号
2023-11-05
HARDLOG_Practical Tamper-Proof System Auditing Using a Novel Audit Device HARDLOG_Practical Tamper-Proof System Auditing Using a Novel Audit Device
源码:https://github.com/microsoft/HardLog Introduction背景有效的系统审计的持久障碍是日志篡改(log tampering)。 ①原则上,审计系统可以通过立即将每个日志条目存储在安全的位置。但
2023-11-05
ConTExT_A Generic Approach for Mitigating Spectre ConTExT_A Generic Approach for Mitigating Spectre
讲解:https://www.youtube.com/watch?v=lVeK1C_AHhc 源码:https://github.com/IAIK/contextlight IntroductionSpectre attack 的攻击方式有
2023-10-24