FPSG-UIUC / GoFetch
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24
☆255Updated 10 months ago
Alternatives and similar repositories for GoFetch
Users that are interested in GoFetch are comparing it to the libraries listed below
Sorting:
- ☆444Updated 2 years ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆204Updated last year
- ☆95Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆65Updated 5 months ago
- Materials from the DEF CON 30 talk on PACMAN☆32Updated 2 years ago
- ☆323Updated last year
- CVE-2022-32947 walkthough and demo☆172Updated last year
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆230Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- Student Starter Code for Secure Hardware Design at MIT☆72Updated 11 months ago
- io_uring based rootkit☆171Updated 2 weeks ago
- Damn Vulnerable UEFI☆274Updated 8 months ago
- Spectre based on Linear Address Masking☆68Updated last year
- Domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant vide…☆307Updated 5 months ago
- ☆112Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆42Updated 2 years ago
- The public release of LeftoverLocals code☆66Updated last year
- Low-Level Software Security for Compiler Developers☆558Updated 3 weeks ago
- The first analysis framework for CPU microcode☆392Updated 2 years ago
- XNU kernel, Kernel Collection and CodeQL build scripts☆232Updated last week
- A Course in Cryptanalysis☆144Updated 7 months ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆35Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- ☆427Updated 5 months ago
- Website and PoC collection for transient execution attacks☆182Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆477Updated last year
- playing with DDR DRAM bus fault injection☆91Updated 7 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆132Updated 9 months ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago