Open Source Projects


Below are open source projects created by our own AIS employees. These ventures reflect our desire to test the limits of technology. Take a look around!


The Bareflank Hypervisor is an open source, hypervisor Software Development Toolkit (SDK). Bareflank aims to provide all of the scaffolding needed to rapidly prototype new hypervisors. Currently Bareflank has support for Linux and Windows on Intel 64bit CPUs, but support for OS X, and UEFI is coming as well as support for ARM and AMD platforms.

Environmental Characterization and Response (ECR)

The ECR effort developed a novel technology capable of characterizing a cloud platform's privileged architectural software from within an unprivileged environment, providing the foundation for development of autonomous, self-protecting cloud applications.


A modular library for manipulating physically-uncloneable functions. Trusted computing primitives generally consist of a TPM or other chip-set extensions, making trusted computing challenging on legacy or embedded platforms. PUFlib aims to alleviate those by providing a seal() and unseal() API that relies on one or more PUFs, tying the sealed data to that exact hardware. This project aims to both provide more PUF sources and greater hardware support.

Crema: A Sub-Turing Programming Language

Crema is a LLVM front-end that aims to specifically execute in sub-Turing Complete space. Designed to be simple to learn, and practical for the majority of programming tasks needed, Crema can restrict the computational complexity of the program to the minimum needed to improve security.

MacResponse Forensics

Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.


Examined the feasibility of utilizing TLB splitting as a mechanism for periodic measurement of dynamically changing binaries. The effort created a proof-of-concept system to split the TLB for target applications, allowing dynamic applications to be measured and can detect code corruption with low performance overhead.

Continuous Integration Example - CI_HelloWorld

Provides a simple example for how to setup various CI services as well as integrating analysis tools into these services. These tools should be used as part of a comprehensive Software Development Process (SDP) and can also be used as a starting template for any C or C++ application.

Trusted Enclave Sandbox and Toolkit (TEST)

TEST is capable of Asymmetric and Symmetric Multi-Processing (AMP and SMP, respectively), and the TrustZone profile contains functionality analogous to all of TrustZone's control bits. It contains a soft processor which is completely platform independent, which relies on a pure software instruction stack. This creates a software-friendly platform which can be used to explore assessing sandboxing solutions, TEEs, and similar solutions.
Call us today to talk about your requirements, and we’ll customize a solution for your organization.