project-oak / hafnium-verification
☆29Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for hafnium-verification
- Verification of BPF JIT compilers☆54Updated last year
- rmem public repo☆40Updated 3 months ago
- Crellvm: Verified Credible Compilation for LLVM☆15Updated 6 years ago
- Rust Bindings to interact with SMTLIB2 compliant solvers☆16Updated 5 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- ☆35Updated 7 years ago
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- The Coq development of A Promising Semantics for Relaxed-Memory Concurrency☆33Updated last month
- ☆30Updated 2 years ago
- Alive (Automated LLVM's InstCombine Verifier) with automated reasoning for both integer and floating point peephole optimizations in LLVM☆28Updated 5 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- Secure Virtual Architecture☆42Updated 5 years ago
- Automatic Binary Parallelisation☆37Updated last year
- Semantics of x86-64 in K☆143Updated 4 years ago
- This repo contains the artifact for our SOSP'19 paper on Serval☆28Updated 5 years ago
- ☆46Updated 2 years ago
- llvm opt fuzzer and bounded exhaustive test generator☆39Updated 2 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Updated 7 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆103Updated 2 years ago
- CheriOS -- a minimal microkernel that demonstrates "clean-slate" CHERI memory protection and object capabilities☆36Updated last year
- MIT's abstract interpretation class taught by Cousot☆36Updated 10 years ago
- ☆34Updated 6 years ago
- a paper template☆51Updated last year
- ☆31Updated 2 years ago
- Pedagogical Hypervisor, based on MIT JOS☆66Updated 6 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- Constraint solver based on coverage-guided fuzzing☆239Updated 11 months ago
- ☆17Updated 4 years ago
- Experimental translation of llvm to smt.☆56Updated 4 years ago