Adelie's source code
☆12Mar 2, 2022Updated 4 years ago
Alternatives and similar repositories for source
Users that are interested in source are comparing it to the libraries listed below
Sorting:
- Scheduler scoreboard is a single toolkit to capture and report all the data related to the Linux Kernel Scheduler which can help analyze …☆16Feb 14, 2025Updated last year
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- Clone of Dune http://dune.scs.stanford.edu/☆20Jan 29, 2014Updated 12 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- ☆29Aug 7, 2025Updated 6 months ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- ☆30Dec 12, 2021Updated 4 years ago
- ☆37May 19, 2023Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- Prácticas de la asignatura "Ampliación de Sistemas Operativos y redes"☆13Feb 1, 2018Updated 8 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- A binary/file REST API to aid in multi-distro|arch|release management☆11Feb 13, 2026Updated 2 weeks ago
- Sync the time on your PineTime using Chrome over Bluetooth LE☆12Mar 31, 2022Updated 3 years ago
- Ten Thousand Failures Blog☆12Jul 22, 2014Updated 11 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- The Fast Lines of Code Counter☆11Aug 22, 2025Updated 6 months ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- ☆11Aug 28, 2024Updated last year
- My utility bash scripts.☆11Jul 14, 2020Updated 5 years ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago
- Course Ethics, Law & Profession of Computer Science, from CS at UCM (Ética, Legislación y Profesión de la Facultad de Informática UCM…☆14Sep 3, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- ☆11Mar 8, 2021Updated 4 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago