Resources > Open Source Projects
OPEN SOURCE Projects
We believe that open source is good for the health of cyberspace. Open and freely available software enables and encourages collaboration and community development.
The Bareflank Hypervisor is an open source, hypervisor Software Development Toolkit (SDK). Bareflank aims to provide all of the scaffolding needed to rapidly prototype new hypervisors. Currently Bareflank has support for Linux and Windows on Intel 64bit CPUs, but support for OS X, and UEFI is coming as well as support for ARM and AMD platforms.
OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration. It includes hardened Xen VMs that can be configured as a user-facing virtualization appliance, for client devices with Linux and/or Windows guests. AIS did not create OpenXT but we currently maintain the toolkit.
A modular library for manipulating physically-uncloneable functions. Trusted computing primitives generally consist of a TPM or other chip-set extensions, making trusted computing challenging on legacy or embedded platforms. PUFlib aims to alleviate those by providing a seal() and unseal() API that relies on one or more PUFs, tying the sealed data to that exact hardware. This project aims to both provide more PUF sources and greater hardware support.
Crema is a LLVM front-end that aims to specifically execute in sub-Turing Complete space. Designed to be simple to learn, and practical for the majority of programming tasks needed, Crema can restrict the computational complexity of the program to the minimum needed to improve security.
Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.
Examined the feasibility of utilizing TLB splitting as a mechanism for periodic measurement of dynamically changing binaries. The effort created a proof-of-concept system to split the TLB for target applications, allowing dynamic applications to be measured and can detect code corruption with low performance overhead.
Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.Provides a simple example for how to setup various CI services as well as integrating analysis tools into these services. These tools should be used as part of a comprehensive Software Development Process (SDP) and can also be used as a starting template for any C or C++ application.
Analyzed instructions and memory accesses on a guest system which was been deployed on a hypervisor. ECR leveraged a variety of metrics to determine the potential presence – or lack – of introspection, and served to establish the limits of attack and limits of detection touched upon earlier.
Reach out to talk to one of our experts and learn more about our open source projects.