Resources > Open Source Projects
OPEN SOURCE Projects
We believe that open source is good for the health of cyberspace. Open and freely available software enables and encourages collaboration and community development.
The Bareflank Hypervisor is an open source, hypervisor Software Development Toolkit (SDK). Bareflank aims to provide all of the scaffolding needed to rapidly prototype new hypervisors. Currently Bareflank has support for Linux and Windows on Intel 64bit CPUs, but support for OS X, and UEFI is coming as well as support for ARM and AMD platforms.
MicroV is an open source hypervisor built from the ground up, designed specifically to execute Micro VMs (i.e., tiny virtual machines with no emulation needed to execute them). AIS developed MicroV to support its U.S. Government and commercial customers with everything from basic research to operational environments with strict requirements on performance, security, reliability, disaggregation, isolation, and a small trusted computing base.
The Environmental Characterization and Response (ECR) effort developed a novel technology capable of characterizing a cloud platform’s privileged architectural software from within an unprivileged environment, providing the foundation for development of autonomous, self-protecting cloud applications.
We are always looking for next-level team members. Try our challenges to find out if you’re one of us.
A modular library for manipulating physically-uncloneable functions. Trusted computing primitives generally consist of a TPM or other chip-set extensions, making trusted computing challenging on legacy or embedded platforms. PUFlib aims to alleviate those by providing a seal() and unseal() API that relies on one or more PUFs, tying the sealed data to that exact hardware. This project aims to both provide more PUF sources and greater hardware support.
Crema is a LLVM front-end that aims to specifically execute in sub-Turing Complete space. Designed to be simple to learn, and practical for the majority of programming tasks needed, Crema can restrict the computational complexity of the program to the minimum needed to improve security.
Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.
Examined the feasibility of utilizing TLB splitting as a mechanism for periodic measurement of dynamically changing binaries. The effort created a proof-of-concept system to split the TLB for target applications, allowing dynamic applications to be measured and can detect code corruption with low performance overhead.
Provides a simple example for how to setup various CI services as well as integrating analysis tools into these services. These tools should be used as part of a comprehensive Software Development Process (SDP) and can also be used as a starting template for any C or C++ application.
TEST is capable of Asymmetric and Symmetric Multi-Processing (AMP and SMP, respectively), and the TrustZone profile contains functionality analogous to all of TrustZone’s control bits. It contains a soft processor which is completely platform independent, which relies on a pure software instruction stack. This creates a software-friendly platform which can be used to explore assessing sandboxing solutions, TEEs and similar solutions.
OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration. It includes hardened Xen VMs that can be configured as a user-facing virtualization appliance, for client devices with Linux and/or Windows guests. AIS did not create OpenXT but we currently maintain the toolkit.
Reach out to talk to one of our experts and learn more about our open source projects.