CENSUS / masked-aes-c
Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks
☆36Updated 4 years ago
Alternatives and similar repositories for masked-aes-c:
Users that are interested in masked-aes-c are comparing it to the libraries listed below
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆87Updated 6 years ago
- ☆23Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- ☆16Updated 2 years ago
- ☆17Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆30Updated 2 weeks ago
- Symbolic executor for Binary Ninja's MLIL☆22Updated 6 months ago
- ☆53Updated 3 weeks ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆20Updated last year
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆14Updated last year
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆63Updated 3 years ago
- Adds a window to Binary Ninja that explains in simple-ish English what an instruction does☆53Updated 2 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆46Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 2 months ago
- M1 bare metal project in Rust☆30Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- QEMU with support for QDSP6 user mode emulation☆32Updated 5 years ago
- Meltdown/Spectre PoC for Windows☆24Updated 6 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 2 years ago
- Making Type Info Library (TIL) file for Apache modules☆55Updated 4 years ago
- Differential fault analysis framework for AES128☆48Updated 11 years ago
- ARMv7 architecture plugin☆40Updated last year
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago