RiS3-Lab / OAT-ProjectLinks
Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)
☆16Updated 5 years ago
Alternatives and similar repositories for OAT-Project
Users that are interested in OAT-Project are comparing it to the libraries listed below
Sorting:
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Updated 3 years ago
- Raspbian with OP-TEE support.☆30Updated 6 years ago
- ☆40Updated 2 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated 3 years ago
- ☆28Updated 3 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 9 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆45Updated 11 months ago
- Policy-Guided Fuzzing for Robotic Vehicles☆40Updated 2 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- ☆15Updated 4 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 6 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- Detect missing check bugs in OS kernels☆113Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated last month
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12Updated last year
- ☆25Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆21Updated 2 years ago
- ☆11Updated 3 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 7 years ago
- FirmSec Dataset☆44Updated 2 months ago
- ☆52Updated 5 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- ☆47Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- ☆28Updated 5 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Recent Paper About Bug Detection☆31Updated 6 years ago