Collected molecules will appear here. Add from search or explore.
Binary-level fault injection simulator that modifies ELF files to mimic hardware-level disturbances like voltage/clock glitching and bit-flipping, primarily for testing the robustness of embedded neural networks.
Defensibility
stars
0
B-Faultor is a specialized research tool with zero community traction (0 stars/forks) and no recent activity. It functions as a support utility for a specific research project rather than a general-purpose security tool. While its focus on simulating hardware faults at the ELF binary level is a valid niche in embedded security research, it lacks the sophistication and ecosystem of established fault injection frameworks like FAIL* (LLVM-based) or QEMU-based injectors. Its defensibility is nearly non-existent as the logic for manipulating ELF sections to simulate bit-flips or instruction corruption is a well-understood pattern in the reverse engineering community. Frontier labs are unlikely to care about this niche, but specialized security firms or academic competitors could displace this utility with a single internal sprint or by using more robust frameworks like the Unicorn Engine or Qiling.
TECH STACK
INTEGRATION
cli_tool
READINESS