jtcriswell / SVA
Secure Virtual Architecture
☆42Updated 5 years ago
Alternatives and similar repositories for SVA:
Users that are interested in SVA are comparing it to the libraries listed below
- Open-source release for MemSentry (EuroSys'17)☆47Updated 3 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆215Updated 3 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆51Updated 2 years ago
- SoftBoundCETS for LLVM+Clang version 34☆57Updated 10 years ago
- MCFI/PICFI tool chain☆42Updated 10 months ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆55Updated 7 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago
- Experimental setup of "Intel MPX explained"☆26Updated 5 years ago
- ☆55Updated 2 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆32Updated 3 years ago
- ☆70Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆32Updated 7 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- Fast Binary Translator for the Kernel☆27Updated 11 years ago
- Monitor, rewrite and/or otherwise trap system calls... on Linux/x86{,-64} only, for now.☆60Updated 2 weeks ago
- Dynamic instrumentation of the Linux kernel☆41Updated 9 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- ☆63Updated 3 years ago
- ☆35Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 8 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- ☆110Updated 11 years ago
- Hacks and experiments for the linux kernel VM subsystem.☆22Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Security-Oriented Analysis of Application Programs☆13Updated 6 years ago
- ☆74Updated 2 years ago