☆22Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for patharmor
Users that are interested in patharmor are comparing it to the libraries listed below
Sorting:
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Fast Binary Translator for the Kernel☆28Sep 23, 2013Updated 12 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Oct 26, 2015Updated 10 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆37May 19, 2023Updated 2 years ago
- ☆32Jan 3, 2022Updated 4 years ago
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- ☆12Jul 26, 2022Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆28Dec 18, 2025Updated 2 months ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆20Nov 6, 2024Updated last year
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Jan 6, 2019Updated 7 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆74Dec 5, 2019Updated 6 years ago