Source code for DABANGG attack.
☆10Mar 26, 2022Updated 3 years ago
Alternatives and similar repositories for Source-Code
Users that are interested in Source-Code are comparing it to the libraries listed below
Sorting:
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- ☆12Sep 12, 2025Updated 5 months ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- A extension for chrome providing a personal assistant bot☆10Dec 13, 2022Updated 3 years ago
- Ten Thousand Failures Blog☆12Jul 22, 2014Updated 11 years ago
- All the info you need to create and run a Julia Student Club.☆10Jan 19, 2021Updated 5 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- ☆10Jul 11, 2019Updated 6 years ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Oct 12, 2021Updated 4 years ago
- ☆15Jun 7, 2022Updated 3 years ago
- A virtual sandbox where beginners can play around with Git and visualize how Git works under the hood.☆12Apr 26, 2021Updated 4 years ago
- C-compatible enum for Julia☆15Dec 23, 2023Updated 2 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- ☆11Jan 19, 2024Updated 2 years ago
- Press any key, A to Z, enjoy animations with sounds. Built using libraries Paper.js & Howler.js☆12Apr 11, 2019Updated 6 years ago
- ☆11May 7, 2018Updated 7 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- ☆10Apr 13, 2020Updated 5 years ago
- Tiny MATLAB-to-C converter (TMC Compiler)☆13Oct 26, 2020Updated 5 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆11Jul 16, 2020Updated 5 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- DE10 NANO SHA3-256 Proof of Work Miner☆13Sep 8, 2020Updated 5 years ago
- This project produces a clean GDSII Layout with all its details that are used to print photomasks used in the fabrication of a behavioral…☆15Oct 16, 2021Updated 4 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago