Icegrave0391 / PalantirView external linksLinks
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22
☆24Nov 11, 2024Updated last year
Alternatives and similar repositories for Palantir
Users that are interested in Palantir are comparing it to the libraries listed below
Sorting:
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆59Mar 27, 2023Updated 2 years ago
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆40Oct 31, 2022Updated 3 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- ☆14Nov 11, 2025Updated 3 months ago
- ☆10Jun 10, 2024Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 3 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆21Dec 9, 2025Updated 2 months ago
- ☆16Nov 13, 2023Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Hypervisor written in Rust for the RISC-V 1.0 hypervisor extension☆16Oct 21, 2024Updated last year
- Securing System Logs With Intel SGX☆16Mar 31, 2017Updated 8 years ago
- Spike with a coherence supported cache model☆14Jul 9, 2024Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆40Apr 25, 2024Updated last year
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆18Jun 4, 2024Updated last year
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Nov 12, 2019Updated 6 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 3 months ago
- ☆46Sep 8, 2023Updated 2 years ago
- ☆30Feb 9, 2026Updated last week
- An Rust hypervisor for mixed-critical system☆31Sep 6, 2025Updated 5 months ago
- ☆20Oct 31, 2020Updated 5 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Dec 11, 2023Updated 2 years ago
- Rapid prototyping and selection package for pure-Rust RISC-V firmware, with RustSBI + UEFI or RustSBI + LinuxBoot☆27Oct 18, 2024Updated last year
- ☆32Nov 23, 2023Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- ☆123May 3, 2023Updated 2 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆47Jun 19, 2025Updated 7 months ago