FPSG-UIUC / hertzbleed
☆444Updated 2 years ago
Alternatives and similar repositories for hertzbleed
Users that are interested in hertzbleed are comparing it to the libraries listed below
Sorting:
- ☆323Updated last year
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆230Updated last year
- ☆1,491Updated 2 years ago
- The first analysis framework for CPU microcode☆392Updated 2 years ago
- ☆112Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- The x86 processor fuzzer☆505Updated 6 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- ☆183Updated 4 years ago
- ☆405Updated this week
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆114Updated 3 years ago
- ☆95Updated last year
- RIDL test suite and exploits☆355Updated 4 years ago
- High-performance QEMU memory and instruction tracing☆543Updated 9 months ago
- GLM uCode dumps☆289Updated 4 years ago
- A practical attack framework for precise enclave execution control☆456Updated this week
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆477Updated last year
- Website and PoC collection for transient execution attacks☆182Updated last year
- ☆77Updated 3 years ago
- Low-Level Software Security for Compiler Developers☆558Updated 3 weeks ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆194Updated 2 years ago
- Hiding messages in x86 programs using semantic duals☆299Updated 3 weeks ago
- Understand and mitigate software-observable side-channels☆502Updated 4 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆255Updated 10 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆341Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆231Updated last year
- Exploration of x86-64 ISA using speculative execution.☆310Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆345Updated 11 months ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆456Updated 2 years ago