swarupchandra / secure-analytics-sgxLinks
Securing Data Analytics on Intel SGX using Randomization
☆12Updated 7 years ago
Alternatives and similar repositories for secure-analytics-sgx
Users that are interested in secure-analytics-sgx are comparing it to the libraries listed below
Sorting:
- Securing System Logs With Intel SGX☆14Updated 8 years ago
- LLVM with SGX support☆13Updated 7 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Using boost to help implement cryptographic primitives in a clean style☆10Updated 8 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆19Updated 7 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- ☆17Updated 4 years ago
- simple tools☆6Updated 8 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 10 years ago
- ☆11Updated 9 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Updated 7 years ago
- PoC || GTFO Article Materials on Kernel Double Free☆12Updated 8 years ago
- libs2e.so☆20Updated 4 years ago
- Example of intel virtualization extensions usage☆10Updated 8 years ago
- ☆12Updated 8 years ago
- A simple Windows x86-32 debugger☆10Updated 9 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Simple memory benchmarking of Intel SGX☆12Updated 8 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆16Updated 6 years ago
- VHD file format library and tools☆8Updated 12 years ago
- Detect the SCI in windows.☆11Updated 8 years ago
- Modular Provable Security on Commodity System and Application Software Stacks☆13Updated 3 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- ☆9Updated 7 years ago
- RERANZ: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks (See Paper VEE'2017)☆10Updated 7 years ago