ksplit / ksplit-artifacts
Artifacts for the paper "KSplit: Automating Device Driver Isolation"
☆11Updated 2 years ago
Alternatives and similar repositories for ksplit-artifacts:
Users that are interested in ksplit-artifacts are comparing it to the libraries listed below
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- ☆19Updated 3 years ago
- This repo contains the artifact for our SOSP'19 paper on Serval☆29Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- ☆19Updated 2 years ago
- ☆16Updated last year
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Updated 4 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated 11 months ago
- ☆12Updated 2 years ago
- Verification of BPF JIT compilers☆54Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 5 months ago
- Implementation of the Reusable Enclaves paper☆13Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- ☆22Updated 4 years ago
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 5 years ago
- Tests for verifying compliance of RMM implementations☆18Updated 3 weeks ago
- ☆35Updated 3 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- ☆47Updated 2 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆37Updated 2 years ago
- ☆50Updated 2 years ago
- ☆13Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 4 months ago
- Public-facing course info for program analysis materials.☆39Updated 3 months ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Updated 8 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Updated 8 years ago
- Map2Check: Finding Software Vulnerabilities☆28Updated 4 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year