usbarmory / GoTEE-exampleLinks
GoTEE - example application
☆16Updated 3 months ago
Alternatives and similar repositories for GoTEE-example
Users that are interested in GoTEE-example are comparing it to the libraries listed below
Sorting:
- QARMA block cipher in C☆30Updated 2 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Tools created for the DARPA Cyber Grand Challenge that visualize software execution based on traces generated by the CGC Monitor and a Un…☆14Updated 7 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Dr. Disassembler☆36Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆20Updated 8 months ago
- Diary of a reverse-engineer blog☆20Updated last year
- DARPA Cyber Grand Challenge OS syscall library☆18Updated 8 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- DFA scripts using Jlsca☆10Updated 5 years ago
- Collection of RISC-V exploits☆30Updated 5 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26Updated 4 years ago
- A Secure and Memory-Efficient Heap Allocator☆33Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- The public release of LeftoverLocals code☆67Updated last year
- A tool to perform so called BGE attack☆24Updated last month
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated 3 months ago
- Python library for Alphanov's PDM laser sources control☆11Updated 5 years ago
- Pretty printer from GTIRB to assembly code☆48Updated last week
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Side-channel traces visualizer☆15Updated 2 months ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Updated 7 years ago
- ☆36Updated 4 years ago
- ☆34Updated 2 years ago
- ☆21Updated 2 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago