Open Source Projects by AIS

We believe open source strengthens the health and resilience of cyberspace.
By making software freely available and openly accessible, we foster collaboration, transparency and community-driven innovation.

Projects
Archive

Tnok

Tnok is a generic, drop-in, 2-factor gatekeeper for any TCP or UDP network service, providing port-level access controls. Designed for ease of deployment, it does not require a firewall and works without root privileges, Ideal for securing SSH, web services and or any TCP/UDP port across Windows, Linux and mobile devices.

GitLab Page

FISSURE

Frequency Independent SDR-Based Signal Understanding and Reverse Engineering

FISSURE is an open-source RF and reverse engineering framework designed for all skill levels.

GitHub Page

IntroVirt

IntroVirt, short for introspective virtualization, is a customized hypervisor and library that provides a robust virtual machine introspection (VMI) application programming interface (API). Proven use cases include reverse engineering, debugging software and securing guest VMs by limiting access to files or limiting an executing application’s functionality.

GitHub Page

BAREFLANK

Hypervisor Software Development Toolkit

The Bareflank Hypervisor is an open source, hypervisor Software Development Toolkit (SDK). Bareflank aims to provide all of the scaffolding needed to rapidly prototype new hypervisors. Currently Bareflank has support for Linux and Windows on Intel 64bit CPUs, but support for OS X, and UEFI is coming as well as support for ARM and AMD platforms.

GitHub Page
Your consent is required to display this content from youtube - Privacy Settings
Video

MicroV is an open source hypervisor built from the ground up, designed specifically to execute Micro VMs.

The Bareflank™ Processor Abstraction Layer (PAL) transforms facts about your CPU into a software support library.

The Bareflank Support Library (BSL) is a C++20, AUTOSAR and C++ Core Guideline compliant header-only library.

OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration. It includes hardened Xen VMs that can be configured as a user-facing virtualization appliance, for client devices with Linux and/or Windows guests. AIS did not create OpenXT but we currently maintain the toolkit.

Website

SECUREVIEW

SecureView is built on the OpenXT toolkit and AIS currently maintains of the toolkit.

Learn More
SecureView™ is trademarked by the United States Air Force.

Archived Projects

PUFlib®

A modular library for manipulating physically-uncloneable functions. Trusted computing primitives generally consist of a TPM or other chip-set extensions, making trusted computing challenging on legacy or embedded platforms. PUFlib aims to alleviate those by providing a seal() and unseal() API that relies on one or more PUFs, tying the sealed data to that exact hardware. This project aims to both provide more PUF sources and greater hardware support.

Crema

A Sub-Turing Programming Language

Crema is a LLVM front-end that aims to specifically execute in sub-Turing Complete space. Designed to be simple to learn, and practical for the majority of programming tasks needed, Crema can restrict the computational complexity of the program to the minimum needed to improve security.

MacResponse Forensics

Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.

MoRE

Examined the feasibility of utilizing TLB splitting as a mechanism for periodic measurement of dynamically changing binaries. The effort created a proof-of-concept system to split the TLB for target applications, allowing dynamic applications to be measured and can detect code corruption with low performance overhead.

CI Hello World

Designed and developed to provide the critical capabilities needed to reliably collect and analyze data from live computer systems running various versions of Mac OS X.Provides a simple example for how to setup various CI services as well as integrating analysis tools into these services. These tools should be used as part of a comprehensive Software Development Process (SDP) and can also be used as a starting template for any C or C++ application.

ECR Hypervisor

Analyzed instructions and memory accesses on a guest system which was been deployed on a hypervisor. ECR leveraged a variety of metrics to determine the potential presence – or lack – of introspection, and served to establish the limits of attack and limits of detection touched upon earlier.

Conquer the Can You Hack It?® challenges and get on the fast track to joining our team.

Think You Have What It Takes? Test Your Skills

www.canyouhackit.com

We Build Future of Cyberspace

Want to Learn More About AIS?

Visit The AIS Website
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound