BlessedRebuS / RISCV-ROP-TestbedLinks
A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Learning Algorithm.
☆18Updated last year
Alternatives and similar repositories for RISCV-ROP-Testbed
Users that are interested in RISCV-ROP-Testbed are comparing it to the libraries listed below
Sorting:
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Updated 10 months ago
- Student Starter Code for Secure Hardware Design at MIT☆87Updated last week
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆78Updated 2 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆118Updated last year
- ☆12Updated 9 months ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Updated last month
- A curated list of hardware-oriented CTF challenges.☆53Updated 2 weeks ago
- ☆62Updated 11 months ago
- Microarchitectural exploitation and other hardware attacks.☆96Updated last year
- A curated list of awesome side-channel attack resources☆104Updated 2 months ago
- ☆119Updated 3 years ago
- Challenges of the HeroCTF v5 edition.☆49Updated last year
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Updated last month
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- ☆16Updated 7 months ago
- Write ups for Ph0wn CTF☆48Updated 5 months ago
- Spectre based on Linear Address Masking☆68Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- Pre-Silicon Hardware Fuzzing Toolkit☆60Updated 5 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆65Updated 8 months ago
- A Python library to debug binary executables, your own way.☆294Updated this week
- Workshop on firmware reverse engineering☆356Updated 4 months ago
- A full English version of the popular ctf-wiki☆109Updated last year
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆38Updated 5 years ago
- Some writeups for some CTFs☆18Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Updated 11 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Updated 2 years ago
- Source code for the DEF CON 33 CTF Qualifiers.☆57Updated 5 months ago