0xADE1A1DE / RositaLinks
☆15Updated 2 years ago
Alternatives and similar repositories for Rosita
Users that are interested in Rosita are comparing it to the libraries listed below
Sorting:
- ☆48Updated last year
- ☆23Updated 5 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated last year
- Side-channel analysis setup for OpenTitan☆32Updated last month
- ☆12Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆15Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆17Updated 10 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated last year
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆21Updated last year
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆15Updated this week
- Side-channel traces visualizer☆15Updated last month
- HW interface for memory caches☆28Updated 5 years ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆24Updated last month
- ☆25Updated 2 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- ☆17Updated last year
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆22Updated 8 months ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆21Updated 2 years ago
- ☆18Updated 2 years ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- ☆16Updated 2 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆41Updated 3 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 2 years ago