☆25Jun 2, 2024Updated last year
Alternatives and similar repositories for Chestnut
Users that are interested in Chestnut are comparing it to the libraries listed below
Sorting:
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- ☆22Nov 12, 2020Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆70May 3, 2022Updated 3 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Run Unikraft ELF Loader app on Linux executables☆15Oct 19, 2023Updated 2 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆16Nov 28, 2024Updated last year
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated last month
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Feb 17, 2022Updated 4 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- SUPA☆28Jan 15, 2026Updated last month
- Compartmentalised monolithic library OS☆20Jul 15, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆29Jul 4, 2018Updated 7 years ago