RiS3-Lab / OAT-ProjectLinks
Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)
☆16Updated 5 years ago
Alternatives and similar repositories for OAT-Project
Users that are interested in OAT-Project are comparing it to the libraries listed below
Sorting:
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Updated 4 years ago
- Raspbian with OP-TEE support.☆30Updated 6 years ago
- ☆29Updated 3 years ago
- ☆40Updated 2 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated 3 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆55Updated 10 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated last year
- Policy-Guided Fuzzing for Robotic Vehicles☆41Updated 2 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- ☆11Updated 3 years ago
- Recent Paper About Bug Detection☆31Updated 6 years ago
- Detect missing check bugs in OS kernels☆113Updated 2 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 6 years ago
- ☆15Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆100Updated 2 months ago
- FirmSec Dataset☆46Updated 3 months ago
- ☆47Updated 4 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- ☆25Updated 4 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆15Updated 3 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- TFA project for indirect call analysis☆10Updated 10 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Updated 4 years ago
- Program dependence graph in LLVM☆42Updated 5 months ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12Updated last year
- ☆50Updated 5 years ago
- ☆26Updated last year
- ☆110Updated 10 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆73Updated last year