NSKernel / Kernel-Play-GuideLinks
A usage-guided Linux Kernel manual
☆9Updated 4 years ago
Alternatives and similar repositories for Kernel-Play-Guide
Users that are interested in Kernel-Play-Guide are comparing it to the libraries listed below
Sorting:
- A naive interpreter for IR of NJU compiler principle lab3, to accelerate interpretation, the ir will be compiled to machine-friendly bina…☆16Updated 5 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- 2022 年春季学期清华大学《软件 分析与验证》课程实验平台 (Lab for Software Analysis and Verification, 2022 Spring, Tsinghua University)☆211Updated 4 months ago
- A formally verified security module for AMD confidential VMs☆47Updated last month
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- MetaMut is a mutation operator generator to facilitate compiler fuzzing.☆26Updated 6 months ago
- Implementation of the Reusable Enclaves paper☆14Updated last year
- 南京大学山寨毕业论文 模版☆128Updated 6 years ago
- caijiqhx notes☆17Updated 8 months ago
- ☆34Updated last year
- Concurrency Paper☆110Updated 2 years ago
- ☆68Updated 5 years ago
- Penglai Enclave is an open-sourced, secure and scalable TEE system for RISC-V.☆140Updated 4 months ago
- ☆15Updated last year
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- configuration evolution dataset☆18Updated 4 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Updated 3 years ago
- Program analysis and verification framework☆25Updated 3 weeks ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆42Updated 11 months ago
- ☆26Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- ☆23Updated 2 years ago
- This is the main repo for Penglai.☆69Updated last year
- ☆19Updated 3 years ago
- OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering☆37Updated 10 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 3 months ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Updated last year
- Program dependence graph in LLVM☆39Updated last month
- A JIT Compiler Fuzzer for JVMs via CSX/JoNM in "Validating JIT Compilers via Compilation Space Exploration" (SOSP'23)☆56Updated 4 months ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆23Updated 11 months ago