cali-library-isolation / Cali-library-isolationView external linksLinks
☆16Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for Cali-library-isolation
Users that are interested in Cali-library-isolation are comparing it to the libraries listed below
Sorting:
- ☆15Apr 13, 2021Updated 4 years ago
- Compartmentalised monolithic library OS☆20Jul 15, 2021Updated 4 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- ☆25Jun 2, 2024Updated last year
- ☆20Mar 10, 2022Updated 3 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- ☆12Apr 9, 2022Updated 3 years ago
- 2022 USTC 011705 (OSH) Course Project of Runikraft Group☆13Jul 22, 2022Updated 3 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Ring 0 debugger for HDPMI, Jemm and Win31/9X VMM☆15Mar 28, 2024Updated last year
- ☆16Nov 13, 2023Updated 2 years ago
- ☆38Feb 15, 2022Updated 3 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Linux x86_64系统调用简介(长线更新中)☆16Mar 29, 2021Updated 4 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 4 months ago
- Floppy Bridges - Real-time floppy disk access from within *UAE emulators☆30Aug 7, 2024Updated last year
- ☆51Nov 15, 2021Updated 4 years ago
- Universal (int 33h) mouse driver for Windows 3.1☆23Apr 25, 2022Updated 3 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 5 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Workplace Shell for Windows (OS/2 shell look-alike for Windows and Win-OS/2)☆25Nov 30, 2020Updated 5 years ago
- IPX kernel module for Linux 4.18+☆28Dec 21, 2025Updated last month
- ☆24Nov 16, 2023Updated 2 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- ☆25Jun 16, 2021Updated 4 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago