Samsung / kspp-study
Analysis on Kernel Self-Protection: Understanding Security and Performance Implication
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for kspp-study
- A bunch of sample codes related to kernel fuzzing☆12Updated 5 years ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆18Updated last year
- ☆15Updated 9 months ago
- ☆9Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆144Updated 3 years ago
- Prebuilt OP-TEE 3.15 Binaries for QEMUv8 and Run x-test☆14Updated 2 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆10Updated last year
- Fuzzing with controlled compilation☆27Updated last year
- A tool for detecting Spectre vulnerabilities through fuzzing☆35Updated 3 years ago
- ☆17Updated 2 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains☆21Updated 8 months ago
- Medusa Repository: Transynther tool and Medusa Attack☆18Updated 4 years ago
- ☆23Updated 9 months ago
- ☆20Updated 3 years ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆52Updated 2 weeks ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆15Updated 6 years ago
- ☆16Updated 5 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- ☆42Updated 2 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆112Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆20Updated 4 years ago
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆114Updated 2 weeks ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆79Updated 3 weeks ago
- Automatic Compartments for Embedded Systems☆24Updated 4 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆15Updated 3 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆14Updated 3 weeks ago
- Coresight Access Library☆112Updated last week