This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filtering
☆11Nov 4, 2022Updated 3 years ago
Alternatives and similar repositories for c2c
Users that are interested in c2c are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆70May 3, 2022Updated 3 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Silm your kernel with better configuration.☆39May 3, 2024Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆37May 19, 2023Updated 2 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆39Aug 30, 2022Updated 3 years ago
- Static Binary Analysis Platform☆29Mar 8, 2026Updated 2 weeks ago
- ☆13Oct 8, 2021Updated 4 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- ☆13Aug 18, 2025Updated 7 months ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Jun 30, 2022Updated 3 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Verified Wasm runtime☆31Oct 30, 2023Updated 2 years ago
- Hardware-centric Linux kernel debloater☆15Nov 28, 2023Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- This is the study of an interface with PyQT☆14Oct 2, 2020Updated 5 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- ☆25Jun 2, 2024Updated last year
- A categorized list of system calls used by popular Unix-like operating systems☆28Mar 13, 2026Updated last week
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- Compartmentalised monolithic library OS☆21Jul 15, 2021Updated 4 years ago
- ☆28Nov 16, 2021Updated 4 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 5 years ago
- ☆15Jan 30, 2025Updated last year
- Official code for the INFOCOM 2020 paper "Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks."☆11Jun 16, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆17Mar 22, 2019Updated 7 years ago