ephox-gcc-plugins / initify
initify gcc plugin
☆8Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for initify
- Secure Virtual Architecture☆42Updated 5 years ago
- ☆70Updated 4 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Updated 11 years ago
- Picon☆38Updated 7 years ago
- Tracking grsecurity and PaX enabled kernels...☆21Updated 7 years ago
- Allows to execute haskell code in Ida Pro.☆27Updated 8 years ago
- Huffman decompression for version 11.x Intel ME modules☆30Updated 7 years ago
- An implementation of the IETF QUIC protocol in F*☆18Updated 5 years ago
- JEFF file format tools☆27Updated 8 years ago
- Steps to build the Linux kernel using Clang☆99Updated 2 years ago
- FreeRTOS 7.6.0 ported to run as a Xen guest on ARM systems.☆45Updated 5 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 2 years ago
- Run any command transparently in a VM (this repo isn't part of Cappsule)☆27Updated 7 years ago
- The Termite driver synthesis tool☆32Updated 7 years ago
- ikgt manifest☆42Updated 2 years ago
- Mirage support for writing QubesOS AppVM unikernels☆63Updated 2 months ago
- A stack tracer/profiler for Xen domains☆30Updated 2 years ago
- Bring mdb walkers to gdb, also add other helpful commands.☆33Updated this week
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- ☆85Updated 7 years ago
- EsoLangVM Compiler Infrastructure☆11Updated 3 months ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- TrustZone project with Linux 2.6.35 and U-Boot (i.MX53QSB)☆8Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Experimental results of the strata project☆9Updated 8 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆55Updated 7 years ago
- BSD-licensed CTF Implementation☆20Updated 9 years ago
- ☆110Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago