☆56Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for xom-switch
Users that are interested in xom-switch are comparing it to the libraries listed below
Sorting:
- ☆11Apr 22, 2022Updated 3 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆51Nov 15, 2021Updated 4 years ago
- ☆11Updated this week
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- SUPA☆28Jan 15, 2026Updated 2 months ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆25Jun 2, 2024Updated last year
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- RISC-V Security HC admin repo☆18Jan 7, 2025Updated last year
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Jul 6, 2023Updated 2 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆27Oct 19, 2018Updated 7 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- ☆27Sep 5, 2025Updated 6 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago