cali-library-isolation / Cali-library-isolationLinks
☆16Updated 2 years ago
Alternatives and similar repositories for Cali-library-isolation
Users that are interested in Cali-library-isolation are comparing it to the libraries listed below
Sorting:
- ☆12Updated 3 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- ☆20Updated 3 years ago
- ☆35Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- Linux kernel branches for confidential compute research☆18Updated 3 months ago
- ☆50Updated 3 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated last year
- SUPA☆28Updated 5 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆54Updated 3 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆26Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆54Updated 3 months ago
- ☆17Updated last year
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Updated 8 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 7 months ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆57Updated last month
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆22Updated 4 years ago
- Tutorial to write qemu plugins☆33Updated 8 years ago
- ☆19Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 11 months ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 5 years ago
- The Captive Hypervisor☆43Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆30Updated 3 years ago