Mic92 / inspector
Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.
☆14Updated 8 years ago
Alternatives and similar repositories for inspector:
Users that are interested in inspector are comparing it to the libraries listed below
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆55Updated 2 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- ☆16Updated 6 years ago
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 2 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆32Updated 8 years ago
- This repo contains the artifact for our SOSP'19 paper on Serval☆30Updated 5 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆21Updated 7 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆16Updated 6 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago
- ☆12Updated 3 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆52Updated 2 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Verification of BPF JIT compilers☆54Updated last year
- ☆13Updated 5 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- ☆27Updated 3 weeks ago
- ☆16Updated last year
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆24Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Securing System Logs With Intel SGX☆14Updated 8 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- ☆50Updated 2 years ago