isec-tugraz / sgxrop
The code to the SGX-ROP paper
☆183Updated 4 years ago
Alternatives and similar repositories for sgxrop:
Users that are interested in sgxrop are comparing it to the libraries listed below
- A practical attack framework for precise enclave execution control☆449Updated last month
- Spectre attack against SGX enclave☆232Updated 7 years ago
- ☆173Updated 2 years ago
- ☆181Updated 4 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆172Updated 5 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- X41 Smartcard Fuzzer☆115Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- A program to draw rectangles from heap traces.☆132Updated 4 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆371Updated 6 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 5 years ago
- TPM-Fail Attack code & data☆120Updated last year
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆197Updated 3 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆105Updated 3 years ago
- ☆148Updated 6 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆80Updated 7 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆69Updated 8 months ago
- ☆73Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆225Updated 4 years ago
- Proof of concept code for the Spectre CPU exploit.☆303Updated 2 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆154Updated 6 months ago
- ☆185Updated 8 months ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago