shuaifengyun / optee_my_testLinks
☆19Updated 6 years ago
Alternatives and similar repositories for optee_my_test
Users that are interested in optee_my_test are comparing it to the libraries listed below
Sorting:
- ☆35Updated 2 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated 2 years ago
- ☆15Updated 2 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆27Updated 2 years ago
- ☆13Updated 4 years ago
- ☆61Updated 3 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Updated 5 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆27Updated 2 years ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Updated 2 years ago
- caijiqhx notes☆17Updated last year
- Sth in Control-Flow Integrity☆20Updated 6 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated last year
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13Updated 3 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- ☆28Updated 2 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- ☆40Updated 2 years ago
- qemu源码的阅读笔记☆91Updated last year
- This is the main repo for Penglai.☆72Updated 2 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆45Updated 10 months ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Updated 3 years ago
- ☆36Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆16Updated last year
- K-Miner☆74Updated 6 years ago
- ☆12Updated 4 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 8 months ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- Tests for verifying compliance of RMM implementations☆21Updated 2 months ago