jtcriswell / SVA
Secure Virtual Architecture
☆42Updated 5 years ago
Alternatives and similar repositories for SVA:
Users that are interested in SVA are comparing it to the libraries listed below
- Open-source release for MemSentry (EuroSys'17)☆46Updated 3 years ago
- MCFI/PICFI tool chain☆42Updated last year
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆52Updated 2 years ago
- Experimental setup of "Intel MPX explained"☆26Updated 5 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆217Updated 3 years ago
- SoftBoundCETS for LLVM+Clang version 34☆57Updated 10 years ago
- ☆110Updated 11 years ago
- ☆55Updated 2 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆32Updated 7 years ago
- Pedagogical Hypervisor, based on MIT JOS☆67Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 8 years ago
- ☆35Updated 7 years ago
- Steps to build the Linux kernel using Clang☆99Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆55Updated 7 years ago
- ☆63Updated 3 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 3 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆17Updated 8 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- ☆70Updated 4 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago