Lind-Project / safeposix-rust
Rust implementation of SafePOSIX
☆13Updated 3 months ago
Alternatives and similar repositories for safeposix-rust:
Users that are interested in safeposix-rust are comparing it to the libraries listed below
- Lind: Secure Lightweight Adaptive Isolation☆26Updated 2 months ago
- Linux Security Hardening for Confidential Compute☆66Updated 3 months ago
- ☆20Updated last week
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆64Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆172Updated last year
- ☆42Updated 6 months ago
- Confidential Containers Shim Firmware☆100Updated 3 weeks ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆57Updated 2 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆27Updated 8 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆221Updated 7 months ago
- COCONUT-SVSM☆129Updated this week
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 3 years ago
- Confidential Containers Guest Tools and Components☆85Updated this week
- ☆433Updated 5 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated 10 months ago
- ☆23Updated 2 years ago
- Process-based Confidential Container Runtime☆79Updated this week
- Meeting materials☆16Updated 3 weeks ago
- ☆112Updated last year
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆10Updated 11 months ago
- ☆12Updated 3 years ago
- POC for Phantom Attack☆79Updated 2 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆17Updated 3 months ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆26Updated this week
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆284Updated last month
- ☆15Updated 2 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Prototype allocator for the prevention of use-after-free attacks, as described in the S&P 2020 Paper - "MarkUs: Drop-in use-after-free pr…☆14Updated 3 years ago
- A system call interception tool☆54Updated last month