Mic92 / inspector
Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.
☆14Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for inspector
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆37Updated 4 years ago
- Open-source release for MemSentry (EuroSys'17)☆46Updated 3 years ago
- ☆15Updated 6 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆19Updated 7 years ago
- ☆11Updated 3 years ago
- ☆42Updated 2 years ago
- Basic LLVM passes☆17Updated 6 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Updated last year
- ☆37Updated 2 years ago
- Verification of BPF JIT compilers☆54Updated last year
- ☆16Updated last year
- ☆25Updated 6 years ago
- KLEE / CSE Project☆42Updated 4 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 6 years ago
- ☆67Updated 4 years ago
- ☆55Updated 2 years ago
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 2 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Updated 5 years ago
- This repo contains the artifact for our SOSP'19 paper on Serval☆28Updated 5 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- Secure Virtual Architecture☆42Updated 5 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆24Updated 8 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 3 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 5 years ago