Our Projects
Refer to our GitHub profile for more information on open-sourced projects by CuriOSity.

ProvCon
ProvCon is a provenance graph construction framework that generates cyberattack provenance graph and collected as a dataset. ProvCon uses cyberattack information from CTI reports to reproduce the cyberattack in a cyber range. The resulting data are extracted from the cyber range and are used to construct provenance graphs with annotations. The provenance graph dataset constructed using ProvCon is meant to be used by researchers and other downstream systems (e.g., threat hunting, root cause analysis) to have a deeper understanding of the indicators and behaviors of a cyberattack.

VulZoo
VulZoo is a large-scale vulnerability intelligence dataset that integrates various data sources of structural and non-structural data. It is designed to be used by security researchers, penetration testers, and security analysts to get a comprehensive view of vulnerabilities and their associated data.

KernJC
KernJC (Kernel JiaoChang /dʒaʊ tʃɑ:ŋ/) is a vulnerability reproduction tool for Linux kernel. The goal of KernJC is to construct reproducible environments for Linux kernel vulnerabilities, where the real vulnerable kernel version is compiled with the correct kernel configs to make the vulnerability available and triggerable.

Peekaboo
Peekaboo is an attempt to provide an easily extensible and usable dynamic trace format. Peekaboo provides definitions for typical properties expected for dynamic traces like instruction addresses, memory operand info, register info, etc. The trace is structured as a collection of files each corresponding to some piece of information which the trace support.

GraphGenie
GraphGenie is an bug-finding tool to detect logic bugs and performance issues (we also find internal errors) in graph database management systems. Specifically, unlike most existing testing works mutating query predicates, GraphGenie leverages Graph Query Transformations (GQT) to construct semantically equivalent or variant graph query patterns, which enables comparative analysis on their results to reveal bugs. GraphGenie has been tested and found previous unknown bugs on popular graph database engines like Neo4j.

SQLxDiff
The key idea of SQLxDiff is to expand the working scope of differential testing on database management systems by adopting SQL query mappings between old and new database instances. We observe that small efforts into query mappings pay off with greater testing coverage.

FlowFusion
FlowFusion is a fully automated dataflow-driven fuzzing tool that detects various bugs (memory errors, undefined behaviors, assertion failures) in the PHP interpreter. FlowFusion merges multiple PHP test cases by interleaving their dataflows, leveraging dataflow as an efficient representation to create fused tests with richer code semantics and interactions.