Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)
☆18Aug 12, 2016Updated 9 years ago
Alternatives and similar repositories for mvarmor
Users that are interested in mvarmor are comparing it to the libraries listed below
Sorting:
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 8 years ago
- ☆27Sep 5, 2025Updated 6 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- Clone of Dune http://dune.scs.stanford.edu/☆20Jan 29, 2014Updated 12 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Hodor-PKU☆26Sep 14, 2021Updated 4 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Revectorization passes integrated into the LLVM compiler infrastructure☆29Feb 15, 2019Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆23Feb 20, 2026Updated last month
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆23Aug 22, 2022Updated 3 years ago
- Raw BLE advertisement + sniffing tool (Linux)☆16Feb 5, 2024Updated 2 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- ☆14Updated this week
- shaobaobaoer 的椭圆曲线密码学习之路☆14Mar 25, 2019Updated 6 years ago
- ☆13Nov 21, 2024Updated last year
- To store some CTF crypto scripts.☆17May 27, 2018Updated 7 years ago
- Linux kernel module for driving an USB3380 board, exposing a /dev/pciemem device node on the analysis machine representing the physical m…☆15Nov 14, 2025Updated 4 months ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- ☆15May 23, 2023Updated 2 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- This project was done as a part of RISC-V based MYTH (Microprocessor for you in Thirty Hours) workshop organized by Kunal Ghosh and Steve…☆17Sep 23, 2020Updated 5 years ago
- xiaomi lua anti☆32Jul 8, 2020Updated 5 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- A Benchmark Suite for Real-Time Robotics☆12May 3, 2023Updated 2 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Jul 6, 2018Updated 7 years ago
- Repository for author masking☆13Oct 29, 2018Updated 7 years ago
- This adds partial support of AVX2 and AVX-512 to gem5.☆15Dec 19, 2023Updated 2 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Faster version of `symchk /om` for generating PDB manifests of offline machines☆19Apr 18, 2021Updated 4 years ago