☆38Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for HAKC
Users that are interested in HAKC are comparing it to the libraries listed below
Sorting:
- ☆21Apr 15, 2022Updated 3 years ago
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆37May 19, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago
- Top-level repository for LFI: Practical, Efficient, and Secure Software-based Sandboxing☆107Jan 27, 2026Updated last month
- ☆16Sep 29, 2022Updated 3 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Kernel isolation tester.☆18Oct 20, 2022Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Compartmentalised monolithic library OS☆21Jul 15, 2021Updated 4 years ago
- ☆51Nov 15, 2021Updated 4 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Split kernel using extended page tables to provided kernel memory protection☆25Mar 6, 2018Updated 8 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Program dependence graph in LLVM☆41Aug 4, 2025Updated 7 months ago
- Wasp: micro-hypervisor that enables lightweight, isolated virtines☆19Mar 31, 2023Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆26Oct 5, 2016Updated 9 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- caijiqhx notes☆16Oct 26, 2024Updated last year
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago