Hardware-assisted Data-flow Isolation
☆29Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for hdfi
Users that are interested in hdfi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 6 months ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Implementation of Tagged Memory security policies into Rocket Core☆10Nov 8, 2016Updated 9 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆94Aug 9, 2017Updated 8 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆23Aug 22, 2022Updated 3 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- ☆25Jun 2, 2024Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- 武大校园网自动认证登录脚本【Python3】☆14Nov 4, 2020Updated 5 years ago
- SUPA☆28Jan 15, 2026Updated 2 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Mirror kept for legacy. Moved to https://github.com/llvm/llvm-project☆31Nov 7, 2015Updated 10 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Sep 2, 2023Updated 2 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- RISC-V Security HC admin repo☆18Jan 7, 2025Updated last year
- Secure Virtual Architecture☆42Apr 12, 2019Updated 6 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- ☆48Nov 15, 2021Updated 4 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago