☆16Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for erim
Users that are interested in erim are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 6 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Oct 16, 2020Updated 5 years ago
- ☆11Jun 10, 2024Updated last year
- ☆20Mar 10, 2022Updated 4 years ago
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- ☆14Nov 11, 2025Updated 4 months ago
- *DEPRECATED* Intel's Hardware Accelerated Execution Manager (ripped) SDK☆15Dec 8, 2017Updated 8 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Apr 9, 2022Updated 3 years ago
- ModSecurity V3 Envoy Filter☆13Jan 4, 2022Updated 4 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆54Jul 7, 2017Updated 8 years ago
- ☆12Jan 11, 2025Updated last year
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆26Feb 13, 2025Updated last year
- Implementation of the Arm CCA attestation token in Rust☆13Updated this week
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆22Nov 1, 2025Updated 4 months ago
- ☆27Apr 27, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆14Aug 17, 2024Updated last year
- ☆13Aug 18, 2025Updated 7 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆13Nov 21, 2024Updated last year
- ☆13Oct 8, 2021Updated 4 years ago
- ☆15May 23, 2023Updated 2 years ago
- 首届社交群体智能算法大赛 【赛题1:社交媒体舆论场虚假账号检测】第三名(0.8248)方案☆12May 30, 2024Updated last year
- ☆31Feb 27, 2026Updated last month
- Tests for verifying compliance of RMM implementations☆22Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Valgrind for kernel mode software.☆26Jul 21, 2016Updated 9 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆19Nov 27, 2024Updated last year
- ☆18Oct 1, 2025Updated 5 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago