Secure Virtual Architecture
☆42Apr 12, 2019Updated 6 years ago
Alternatives and similar repositories for SVA
Users that are interested in SVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Lists of must-read papers (mainly security papers)☆32Sep 18, 2024Updated last year
- Dynamic instrumentation of the Linux kernel☆41Feb 24, 2015Updated 11 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- SoftBoundCETS for LLVM+Clang version 34☆61Sep 19, 2014Updated 11 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Ruby bindings for DTrace☆63Dec 24, 2012Updated 13 years ago
- ☆54Aug 5, 2013Updated 12 years ago
- Prototype allocator for the prevention of use-after-free attacks, as described in the S&P 2020 Paper - "MarkUs: Drop-in use-after-free pr…☆14Jan 14, 2022Updated 4 years ago
- Global Memory and Threading runtime system☆25Dec 10, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆20Mar 10, 2022Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- Distributed Performance-portable Stencil Compuitation☆10Jul 9, 2023Updated 2 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- Yet another C standard library☆17Oct 6, 2024Updated last year
- Hypervisor implementation for x86_64 ISA MIT JOS☆35Aug 13, 2014Updated 11 years ago
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 6 months ago
- ☆11May 26, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Open-source implementation of the CUDA API.☆13May 5, 2012Updated 13 years ago
- I/O Multiplexing for Linux and OSX (BSD)☆14May 14, 2014Updated 11 years ago
- FlexOS: Towards Flexible OS Isolation (ASPLOS'22) Artifact Evaluation Repository☆19Apr 2, 2022Updated 3 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- An executable specification of the RISCV ISA in L3.☆42Mar 1, 2019Updated 7 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 12 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆49Apr 15, 2018Updated 7 years ago