jovanbulck / 0xbadc0de
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes
☆45Updated last year
Alternatives and similar repositories for 0xbadc0de:
Users that are interested in 0xbadc0de are comparing it to the libraries listed below
- ☆35Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- ☆73Updated 6 years ago
- Securing System Logs With Intel SGX☆14Updated 7 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆121Updated 4 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 8 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- ☆63Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆96Updated 5 years ago
- ☆37Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆57Updated 7 years ago
- ☆25Updated 6 years ago
- ☆55Updated 2 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- ☆50Updated 7 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- ☆63Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 4 years ago
- ☆70Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- ☆15Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago