hku-systems / owl
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for owl
- LLVM Implementation of different ShadowStack schemes for x86_64☆37Updated 4 years ago
- ☆20Updated 3 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆23Updated 3 years ago
- bogo for ASPLOS'19☆9Updated 5 years ago
- K-Miner☆72Updated 5 years ago
- SUPA☆28Updated 4 years ago
- a paper template☆51Updated last year
- ☆39Updated 3 years ago
- ☆38Updated 2 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆34Updated last week
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Updated 7 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆47Updated 6 years ago
- ☆37Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated last year
- ☆48Updated 3 years ago
- ☆31Updated last year
- KLEE / CSE Project☆43Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- This repository contains the artifact for the SOSP'21 paper: Sishuai Gong, Deniz Altınbüken, Pedro Fonseca, Petros Maniatis, "Snowboard:…☆23Updated 2 years ago
- A dynamic analysis framework for concurrent programs (x86 binaries). It is shipped with a few tools written using this framework for test…☆68Updated 7 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆62Updated 3 years ago
- Concurrency Paper☆96Updated last year
- MCFI/PICFI tool chain☆42Updated 8 months ago
- ☆64Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago
- A data dependence analyzer for C program☆20Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆54Updated 7 months ago
- ☆17Updated 5 years ago