LLVM Implementation of different ShadowStack schemes for x86_64
☆39May 2, 2020Updated 5 years ago
Alternatives and similar repositories for ShadowStack
Users that are interested in ShadowStack are comparing it to the libraries listed below
Sorting:
- ☆22Nov 12, 2020Updated 5 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- SUPA☆28Jan 15, 2026Updated last month
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated last year
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆22Nov 16, 2023Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- ☆32Jul 11, 2022Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- This repo contains a RISC-V ISA extension (proposal) to allow recording of control transfer history to on-chip registers, to support usag…☆23Feb 19, 2025Updated last year
- ☆12Jul 3, 2018Updated 7 years ago
- rv8 benchmark suite☆23Jul 30, 2020Updated 5 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- ☆67May 5, 2021Updated 4 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Port of original MemTest86+ v5.1 to other architectures (RISC-V for now)☆16Jan 26, 2020Updated 6 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago