secure-foundations / provably-safe-sandboxing-wasm-usenix22Links
Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"
☆36Updated 2 years ago
Alternatives and similar repositories for provably-safe-sandboxing-wasm-usenix22
Users that are interested in provably-safe-sandboxing-wasm-usenix22 are comparing it to the libraries listed below
Sorting:
- A native symbolic execution engine for WebAssembly☆45Updated 11 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 6 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- Papers related with kernel papers☆13Updated 2 years ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆22Updated 10 months ago
- ☆54Updated 2 years ago
- ☆20Updated 3 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated last year
- Fuzzer for Wasm and Wasmer☆28Updated 5 years ago
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 3 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 8 months ago
- Side-channel Analysis☆15Updated 3 years ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 3 years ago
- ☆26Updated 3 years ago
- ☆35Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Greybox Fuzzing of Distributed Systems (CCS'23)☆50Updated last year
- In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication☆14Updated 2 years ago
- ☆76Updated 2 years ago
- ☆61Updated 2 years ago
- ☆25Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- Public-facing course info for program analysis materials.☆41Updated 6 months ago
- ☆28Updated 3 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆41Updated 10 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- ☆50Updated 2 years ago