Automatic Compartments for Embedded Systems
☆24Mar 6, 2020Updated 5 years ago
Alternatives and similar repositories for ACES
Users that are interested in ACES are comparing it to the libraries listed below
Sorting:
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 5 months ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆28Dec 18, 2025Updated 2 months ago
- ☆19Mar 20, 2014Updated 11 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated 3 weeks ago
- 实现和扩展RISC-V SBI运行时,使之能够支持并运行操作系统☆14Apr 1, 2025Updated 10 months ago
- ☆41Feb 26, 2023Updated 3 years ago
- An AFL scaling benchmarking tool☆18May 29, 2020Updated 5 years ago
- Trusted Computing Architecture for Low-end Embedded Systems☆20Oct 22, 2024Updated last year
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- A security-oriented microkernel for Cortex-M microcontrollers☆25Jun 9, 2016Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- An android binder library for rust☆21Dec 5, 2022Updated 3 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆69Feb 1, 2026Updated 3 weeks ago
- ☆27Sep 5, 2025Updated 5 months ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- Source code of HAL-fuzz☆157Feb 4, 2021Updated 5 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- Project FlowCog (2017)☆27Aug 23, 2018Updated 7 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- A System for Debloating C/C++ Programs☆31Jul 16, 2021Updated 4 years ago