☆15May 26, 2021Updated 4 years ago
Alternatives and similar repositories for dynpta
Users that are interested in dynpta are comparing it to the libraries listed below
Sorting:
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Apr 24, 2017Updated 8 years ago
- ☆14Oct 27, 2021Updated 4 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- ☆47Nov 15, 2021Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 5 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Jun 16, 2024Updated last year
- ☆67May 5, 2021Updated 4 years ago
- Runtime type and bounds-error checking for C/C++☆107Dec 18, 2024Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- ☆37May 19, 2023Updated 2 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- This is check50, a command-line program with which you can check the correctness of your programs.☆12Nov 13, 2021Updated 4 years ago
- A python script to add Songs from Spotify Playlists to YouTube Playlists.☆10Mar 1, 2023Updated 3 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago