CybersecurityUnitn / PISTIS
Trusted Computing Architecture for Low-end Embedded Systems
☆18Updated 4 months ago
Alternatives and similar repositories for PISTIS:
Users that are interested in PISTIS are comparing it to the libraries listed below
- ☆32Updated 2 years ago
- ☆13Updated 5 years ago
- Website for Research Artifacts from the Security Community☆18Updated 2 weeks ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆14Updated 4 years ago
- ☆17Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 5 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆134Updated 3 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆25Updated last year
- ☆20Updated last year
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆19Updated last year
- ☆24Updated 2 years ago
- ☆23Updated last year
- ☆54Updated 4 years ago
- ☆19Updated 6 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆22Updated last year
- Raspbian with OP-TEE support.☆26Updated 5 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆35Updated last year
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆21Updated 2 years ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆22Updated 9 months ago
- Differential Address Trace Analysis☆55Updated 11 months ago
- Recent security papers on firmware analysis☆75Updated 3 years ago
- On the TOCTOU Problem in Remote Attestation☆13Updated 8 months ago
- Sth in Control-Flow Integrity☆20Updated 6 years ago
- ☆160Updated 3 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication☆12Updated 2 years ago
- ☆62Updated 4 months ago
- ☆98Updated 2 years ago
- ☆53Updated 5 years ago