Canhui / AES-ON-GPU
☆34Updated last year
Alternatives and similar repositories for AES-ON-GPU:
Users that are interested in AES-ON-GPU are comparing it to the libraries listed below
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- ☆43Updated 6 years ago
- ☆23Updated 2 months ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- ☆18Updated 6 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆11Updated 7 years ago
- HW interface for memory caches☆26Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 2 years ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆32Updated last year
- ☆16Updated 2 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆52Updated 5 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆28Updated last year
- ☆37Updated last year
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- ☆15Updated 2 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆27Updated 6 years ago
- A small library and kernel module for easy access to x86 performance monitor counters under Linux.☆96Updated last year
- masked, bit-sliced AES-128 demo code☆13Updated 4 months ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆35Updated 2 years ago
- ☆21Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- Tool for testing and finding minimal eviction sets☆101Updated 4 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 9 months ago
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆34Updated 4 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
- PIN-tool to produce multi-threaded atomic memory traces☆36Updated 11 years ago
- Breakthrough AES Performance on CUDA Devices☆38Updated 2 months ago