CactiLab / Sherloc-Cortex-M-CFVD
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems
☆16Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for Sherloc-Cortex-M-CFVD
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆13Updated 4 years ago
- ☆29Updated last year
- ☆24Updated last year
- ☆30Updated 2 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 2 years ago
- ☆18Updated last year
- Derived from CAT-SGX and elf-respect: Practical and Efficient in-Enclave Verification of Privacy Compliance☆41Updated 2 years ago
- ☆21Updated last year
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆25Updated last year
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated last year
- A Specification-Guided Approach for Firmware Emulation☆35Updated 5 months ago
- Securing Embedded Systems with Return Address Integrity☆14Updated 3 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆25Updated 11 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆29Updated 7 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆19Updated last year
- Raspbian with OP-TEE support.☆24Updated 5 years ago
- ☆20Updated 4 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆21Updated 5 years ago
- ☆12Updated 2 years ago
- ☆32Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆18Updated 4 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago
- ☆12Updated 3 years ago
- Reference implementation of Arm-CCA RMM specification☆39Updated this week
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆132Updated last year
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆34Updated last week
- ☆74Updated 5 months ago
- ☆20Updated 3 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated 5 years ago
- Security Test Benchmark for Computer Architectures☆20Updated this week