CybersecurityUnitn / PISTISLinks
Trusted Computing Architecture for Low-end Embedded Systems
☆20Updated last year
Alternatives and similar repositories for PISTIS
Users that are interested in PISTIS are comparing it to the libraries listed below
Sorting:
- Website for Research Artifacts from the Security Community☆31Updated 2 weeks ago
- ☆29Updated 3 years ago
- Resillent Control-Flow Attestation☆13Updated 4 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆27Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Updated 5 years ago
- ☆12Updated 4 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Updated 2 years ago
- Security benchmarks for the Internet of Things☆22Updated 5 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16Updated 8 months ago
- ☆40Updated 2 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆65Updated 8 months ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Updated 3 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- SyzTrust's main repository. Start here to install.☆19Updated last year
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆55Updated 10 months ago
- ☆26Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Updated 4 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 6 years ago
- Automatic Compartments for Embedded Systems☆24Updated 5 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Updated 7 years ago
- ☆77Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Updated 5 years ago
- Recent security papers on firmware analysis☆78Updated 4 years ago
- Differential Address Trace Analysis☆63Updated last year
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆23Updated 3 years ago
- CLKscrew Code and Scripts☆28Updated 5 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Updated last week
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Updated 3 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23Updated 6 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago