Code Repository for DataGuard Framework
☆13Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for DataGuard
Users that are interested in DataGuard are comparing it to the libraries listed below
Sorting:
- ☆15May 26, 2021Updated 4 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- ☆29Aug 7, 2025Updated 6 months ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆27Sep 5, 2025Updated 5 months ago
- ☆22Nov 16, 2023Updated 2 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- ☆37May 19, 2023Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Apr 24, 2017Updated 8 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆11Aug 28, 2024Updated last year
- Implements rapidchain consensus algorithm☆10Jan 30, 2022Updated 4 years ago
- LaTeX package to Do The Right Thing☆13Sep 8, 2021Updated 4 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- Simple macro language extentions to systemtap☆12Dec 14, 2022Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Simple implementation of CoveringLSH☆10Jan 22, 2016Updated 10 years ago
- A light cleaver theme - press ESC to get and overview slide selection☆10May 16, 2016Updated 9 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- make a LLVM Toy RISC-V backend step by step☆12Feb 28, 2024Updated 2 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago