sancus-tee / tutorial-dsn18Links
Building Distributed Enclave Applications with Sancus and SGX
☆15Updated 5 years ago
Alternatives and similar repositories for tutorial-dsn18
Users that are interested in tutorial-dsn18 are comparing it to the libraries listed below
Sorting:
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated 2 years ago
- Differential Address Trace Analysis☆63Updated last year
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- Securing System Logs With Intel SGX☆16Updated 8 years ago
- ☆77Updated 7 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- ☆56Updated 3 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 6 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 8 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆82Updated 6 years ago
- MCFI/PICFI tool chain☆44Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Updated 6 years ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 4 years ago
- Hardware-assisted Data-flow Isolation☆29Updated 8 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Updated 6 years ago
- ☆37Updated 4 years ago
- Security benchmarks for the Internet of Things☆22Updated 5 years ago
- ☆41Updated 6 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Updated 2 months ago
- ☆12Updated 4 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26Updated 8 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Updated 4 years ago
- SUPA☆28Updated 2 weeks ago
- ☆24Updated 7 years ago
- ☆48Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Updated 9 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Updated 4 years ago