adilahmad17 / ObfuscuroView external linksLinks
Commodity Obfuscation Engine for Intel SGX
☆20Jul 21, 2019Updated 6 years ago
Alternatives and similar repositories for Obfuscuro
Users that are interested in Obfuscuro are comparing it to the libraries listed below
Sorting:
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- Compartmentalised monolithic library OS☆20Jul 15, 2021Updated 4 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Dec 11, 2023Updated 2 years ago
- ☆11Nov 13, 2020Updated 5 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- SGX-Spark☆26Dec 5, 2022Updated 3 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- ☆12Apr 9, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆49Apr 15, 2018Updated 7 years ago
- Linux/Unix nbench (previously known as BYTE's Native Mode Benchmarks)☆30Aug 15, 2014Updated 11 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆14Oct 27, 2021Updated 4 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Aug 11, 2021Updated 4 years ago
- Program synthesis tools and utilities for LLVM.☆20Jul 6, 2023Updated 2 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆15Sep 8, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- 面向可信执行环境的OS。☆12May 9, 2025Updated 9 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆69May 31, 2024Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- obfuscation that aims to not stand out☆23Mar 27, 2022Updated 3 years ago
- ☆77Jun 14, 2018Updated 7 years ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆44Aug 12, 2016Updated 9 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- ☆23Mar 13, 2023Updated 2 years ago
- ☆25Jun 2, 2024Updated last year
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- rv8 benchmark suite☆23Jul 30, 2020Updated 5 years ago