Experimental setup of "Intel MPX explained"
☆29Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for intel_mpx_explained
Users that are interested in intel_mpx_explained are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Apr 24, 2017Updated 9 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆95Aug 9, 2017Updated 8 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆57May 24, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆25Oct 4, 2018Updated 7 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- NOVA userland☆49Jan 6, 2014Updated 12 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- NOVA runtime environment (official branch)☆35Jul 1, 2021Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ☆22Jul 19, 2015Updated 10 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- Simple Encrypted File System for Occlum☆13Oct 29, 2025Updated 6 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- AST - Extractor for LLVM☆18Feb 23, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Super efficient TCP connection between remote processes☆12Apr 7, 2016Updated 10 years ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆22Sep 10, 2025Updated 7 months ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆189Mar 26, 2022Updated 4 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 10 years ago
- ☆28Sep 9, 2020Updated 5 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- Migrated to Codeberg☆11Aug 26, 2023Updated 2 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- SGX command-line tools and paper☆148Aug 4, 2016Updated 9 years ago