RiS3-Lab / OAT-ProjectLinks
Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)
☆16Updated 4 years ago
Alternatives and similar repositories for OAT-Project
Users that are interested in OAT-Project are comparing it to the libraries listed below
Sorting:
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated 2 years ago
- ☆38Updated 2 years ago
- ☆28Updated 2 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Updated 3 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆53Updated 7 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆45Updated 9 months ago
- Policy-Guided Fuzzing for Robotic Vehicles☆37Updated 2 years ago
- Raspbian with OP-TEE support.☆29Updated 6 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- ☆10Updated 3 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- Detect missing check bugs in OS kernels☆111Updated 2 years ago
- ☆15Updated 4 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆43Updated 9 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 6 years ago
- ☆28Updated 2 months ago
- Resillent Control-Flow Attestation☆12Updated 4 years ago
- ☆20Updated 3 years ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆15Updated 3 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 4 years ago
- FirmSec Dataset☆42Updated 3 years ago
- ☆24Updated 4 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Securing Embedded Systems with Return Address Integrity☆15Updated last year
- ☆26Updated 7 months ago