Canhui / AES-ON-GPU
☆34Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for AES-ON-GPU
- Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
- ☆44Updated 5 years ago
- ☆21Updated last year
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆30Updated 10 months ago
- ☆17Updated 2 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆11Updated 7 years ago
- ☆71Updated last year
- ARMv8 performance monitor from userspace☆71Updated last year
- HW interface for memory caches☆26Updated 4 years ago
- Reload+Refresh PoC☆13Updated 4 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆48Updated 5 years ago
- This is the main repo for Penglai.☆65Updated last year
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆22Updated 7 months ago
- ☆18Updated 6 years ago
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆37Updated last year
- ☆35Updated 2 months ago
- ☆18Updated last year
- ☆16Updated 2 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆17Updated 4 years ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆25Updated 5 months ago
- ☆26Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆20Updated 4 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆60Updated 2 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆25Updated 6 months ago
- New Cache implementation using Gem5☆13Updated 10 years ago
- Security Test Benchmark for Computer Architectures☆20Updated this week
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆22Updated 2 months ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- Proof of concept code for the BranchSpec exploit.☆9Updated 2 years ago