☆13Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for shard
Users that are interested in shard are comparing it to the libraries listed below
Sorting:
- ☆13Apr 9, 2022Updated 3 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Silm your kernel with better configuration.☆39May 3, 2024Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Kernel isolation tester.☆18Oct 20, 2022Updated 3 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- ☆20Jun 7, 2025Updated 8 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Nov 17, 2021Updated 4 years ago
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Compartmentalised monolithic library OS☆20Jul 15, 2021Updated 4 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago