ieee-security / ongoing-submission-planLinks
Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P
☆15Updated 8 years ago
Alternatives and similar repositories for ongoing-submission-plan
Users that are interested in ongoing-submission-plan are comparing it to the libraries listed below
Sorting:
- SGX command-line tools and paper☆147Updated 9 years ago
- ☆152Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- This repository contains examples of Flush+Flush cache attacks☆167Updated 4 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- ☆28Updated 3 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- Differential fuzzing for the masses!☆153Updated 8 years ago
- DARPA Cyber Grand Challenge Documentation☆117Updated 8 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 8 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 9 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Updated 4 years ago
- ☆77Updated 7 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- This repository contains several tools to perform Cache Template Attacks☆162Updated 3 weeks ago
- MCFI/PICFI tool chain☆44Updated last year
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆91Updated 8 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Updated 8 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- DroidSafe Android Static Analysis Source Repository☆97Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 10 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Updated 3 months ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆190Updated 8 years ago