FPSG-UIUC / GoFetch
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24
☆237Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for GoFetch
- ☆320Updated last year
- Known attacks on Elliptic Curve Cryptography☆234Updated this week
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆223Updated 9 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆182Updated 10 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆52Updated last month
- local language model for radare2☆94Updated this week
- Damn Vulnerable UEFI☆247Updated 2 months ago
- The public release of LeftoverLocals code☆64Updated 10 months ago
- The first analysis framework for CPU microcode☆373Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆101Updated 9 months ago
- CVE-2022-32947 walkthough and demo☆152Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆29Updated 8 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆153Updated 9 months ago
- ☆441Updated 2 years ago
- XZ backdoor reverse engineering☆91Updated 3 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆839Updated 6 months ago
- ☆93Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆466Updated last year
- UEFI and SMM Assessment Tool☆167Updated 6 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆127Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆103Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- easylkb - Easy Linux Kernel Builder☆330Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept☆139Updated 4 years ago
- ☆455Updated 10 months ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- Spectre based on Linear Address Masking☆64Updated 11 months ago
- random dissectors☆68Updated last year
- ☆112Updated last year
- ☆123Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆150Updated last month