intel / pin-based-cec
Pin-Based Constant Execution Checker (Pin-based CEC)
☆16Updated last week
Alternatives and similar repositories for pin-based-cec:
Users that are interested in pin-based-cec are comparing it to the libraries listed below
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- ☆55Updated 2 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆57Updated 9 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated 11 months ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆25Updated 6 years ago
- ☆16Updated 5 years ago
- Pretty printer from GTIRB to assembly code☆48Updated 3 weeks ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated 10 months ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆17Updated 4 months ago
- ☆49Updated 2 years ago
- A symbolic execution engine for LLVM IR☆34Updated 2 years ago
- A version of Griffin used to provide program traces☆15Updated 4 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- ☆16Updated last year
- A tool for detecting Spectre vulnerabilities through fuzzing☆35Updated 3 years ago
- ☆35Updated 3 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆69Updated 8 months ago
- Diablo is a retargetable link-time binary rewriting framework☆75Updated 4 years ago
- ☆23Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year