microsoft / msr-cloakLinks
Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory"
☆15Updated 3 years ago
Alternatives and similar repositories for msr-cloak
Users that are interested in msr-cloak are comparing it to the libraries listed below
Sorting:
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Updated 2 years ago
- ☆48Updated 7 years ago
- Hypervisor implementation for x86_64 ISA MIT JOS☆34Updated 11 years ago
- memTrace, a framework for lightweight memory tracing☆58Updated 6 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Updated 8 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Updated 7 years ago
- LLVM with SGX support☆13Updated 8 years ago
- ☆38Updated 8 years ago
- This repo contains Microsoft compiler-tests to validate Windows platform particulars.☆28Updated 2 years ago
- ☆12Updated 3 years ago
- QEMU based emulation library for micro-architectural simulation (ARM64 and x86)☆42Updated 6 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10Updated 6 years ago
- Extensible Memory Benchmarking Tool☆115Updated 8 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Updated 3 years ago
- ☆52Updated 3 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Updated 7 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆110Updated 3 years ago
- Securing System Logs With Intel SGX☆16Updated 8 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26Updated 8 years ago
- Trusted I/O Paths for SGX Enclaves☆18Updated 5 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Updated 8 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 6 years ago
- Hardware performance counter tool for Windows OS☆17Updated 7 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Updated 2 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- Tools to track memory accesses in applications and visualize the patterns to reveal opportunities for optimization.☆92Updated 10 years ago
- Compartmentalised monolithic library OS☆20Updated 4 years ago
- Mirror kept for legacy. Moved to https://github.com/llvm/llvm-project☆31Updated 10 years ago