sslab-gatech / kenali-kernel
Modified Nexus 9 kernel for Kenali Project
☆30Updated 5 years ago
Alternatives and similar repositories for kenali-kernel:
Users that are interested in kenali-kernel are comparing it to the libraries listed below
- ☆71Updated 5 years ago
- K-Miner☆75Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆24Updated 6 years ago
- MCFI/PICFI tool chain☆42Updated last year
- ☆37Updated 2 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- ☆64Updated 6 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 8 years ago
- ☆55Updated 2 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Updated 12 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- ☆53Updated 7 years ago
- bogo for ASPLOS'19☆9Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆61Updated 5 years ago
- Stony Brook University CFI library☆21Updated 10 years ago
- ☆46Updated 3 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- SUPA☆28Updated 5 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 5 months ago
- Official repository for ASAP: High System-code Security at Low Overhead☆25Updated 9 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- ☆17Updated 5 years ago
- ☆14Updated 7 years ago