☆22Nov 12, 2020Updated 5 years ago
Alternatives and similar repositories for cfi-eval
Users that are interested in cfi-eval are comparing it to the libraries listed below
Sorting:
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- SUPA☆28Jan 15, 2026Updated 2 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- A port of the RIPE suite to RISC-V.☆29Oct 10, 2018Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- ☆25Jun 2, 2024Updated last year
- ☆29Jul 4, 2018Updated 7 years ago
- Benchmarking code for evaluating the cost of cache coherence protocols implemented on different platforms☆14Apr 13, 2021Updated 4 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆28Aug 10, 2020Updated 5 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- ☆13Jan 7, 2025Updated last year
- Development area for another repo: Learn_Bluespec_and_RISCV_Design☆13Nov 10, 2025Updated 4 months ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆12Jul 3, 2018Updated 7 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago