TJAndHisStudents / Griffin-TraceView external linksLinks
A version of Griffin used to provide program traces
☆15Sep 2, 2020Updated 5 years ago
Alternatives and similar repositories for Griffin-Trace
Users that are interested in Griffin-Trace are comparing it to the libraries listed below
Sorting:
- ☆25Jun 16, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated 10 months ago
- ☆17Jun 7, 2022Updated 3 years ago
- Adelie's source code☆12Mar 2, 2022Updated 3 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- ☆18Sep 4, 2023Updated 2 years ago
- PathArmor context-sensitive CFI implementation☆45Oct 26, 2015Updated 10 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- ☆35Feb 4, 2026Updated last week
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- ☆51Nov 15, 2021Updated 4 years ago
- ☆29Aug 7, 2025Updated 6 months ago
- ☆24Nov 16, 2023Updated 2 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 3 years ago
- ☆35Oct 29, 2025Updated 3 months ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- ☆40Jan 5, 2026Updated last month
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- A collection of code based on LLVM/Clang compilation libraries and tools☆39Jan 15, 2020Updated 6 years ago
- A basic DNN tutorial in PyTorch, for persons without a background in Linux, Python, or remote servers☆10Apr 2, 2020Updated 5 years ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆15Oct 27, 2024Updated last year
- Turns signals within a scope into c++ exceptions☆15Nov 8, 2022Updated 3 years ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆19Sep 10, 2025Updated 5 months ago