drammer
Native binary for testing Android phones for the Rowhammer bugvuzzer
revanc
Reverse Engineering Page Table Caches in Your Processorridl
RIDL test suite and exploitsvuzzer64
This implements a 64-bit version of vusec/vuzzer fuzzing tool.parmesan
ParmeSan: Sanitizer-guided Greybox Fuzzinghammertime
trrespass
TRRespassbhi-spectre-bhb
This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerabilityguardion
Android GuardION patches to mitigate DMA-based Rowhammer attacks on ARMcollabfuzz
CollabFuzz: A Framework for Collaborative Fuzzingdangsan
floatzone
pandacap
A framework for streamlining the capture of PANDA execution traces.slam
Spectre based on Linear Address Maskingdeltapointers
Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)kasper
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernelsmash
memsentry
Open-source release for MemSentry (EuroSys'17)typearmor
Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacksuncontained
Uncovering Container Confusion in the Linux Kernelinspectre-gadget
InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgetsblindside
xlate
Code to evaluate XLATE attacks as well existing cache attacks.typesan
TypeSan checks casts in C++ code - code released for CCS 2016minesweeper
Tools used for MineSweeper projectsafeinit
SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017kmvx
kMVX: Detecting Kernel Information Leaks with Multi-variant Executionpatharmor
instrumentation-infra
An extendable and flexible infrastructure for program instrumentation.mvarmor
Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)shalloc
Shared memory allocatortlbdr
dangzero
tlbkit
some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.fpvi-scsb
Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attackstriereme
midfat
ramses
Memory address translation library.LookUB
snappy
TIFF
drammer-app
GUI for testing Android phones for the Rowhammer bugtypeisolation
Type-based Data Isolation prototypevusion
probeguard
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [ ASPLOS'19 ]dune
Dune forkpoking-holes
Project for the Poking Holes in Information Hiding paperalis
LLVMUtils
This repository contains a number of generic LLVM utility functions, setters, and/or getters for use in different LLVM passes.libshrink
A user-space runtime library to shrink the address space to a specified number of bits.zebram
pibe
PIBE project source codeinfra-sanitizers
Configurations for benchmarking sanitizersqemu-hypercall
QEMU offering the hypercall interface used by HSFI and OSIRISfirestarter
aos-labs-2021
Vrije Universiteit Amsterdam - Advanced Operating Systems (OpenLSD)osiris
delorean
hammertime-fliptables
Rowhammer flip tables collected using Hammertime.instrumentation-skeleton
Skeleton repository for instrumentation-infra users.Copy-on-Flip
aos-labs-2020
Vrije Universiteit Amsterdam - Advanced Operating Systems (OpenLSD)absynthe
ABSynthe related codeminix-llvm
MINIX with the changes from the llvm_squashed branch needed for OSIRIS and HSFIlibumem-mvx
libumem fork for MvArmorSCC
The |S|uborbital |C||C|annon compiler fuzzing frameworklibdft64-ng
Fork of https://github.com/AngoraFuzzer/libdft64 with support for shadow memory-based tagmap, small set tags, pointer/offset labels, and taint all memory semantics.dsn-2016-hsfi
type-after-type
kamino
SpeculationAtFault-AE
Artifact of "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions"kdfsan-llvm-project
kdfsan-syzkaller
kdfsan-linux
coco-docs
Vrije Universiteit Amsterdam - Compiler Construction (aux docs)pirop
PIROP Asterisk exploitsvu-forms-and-templates
VU forms and templatesuncontained-llvm-project
lldb-dfsan
Debugging DFSan labels with LLDBLove Open Source and this site? Check out how you can help us