HE-Wenjian / SGXlingerLinks
A side-channel attack vector based on interrupt latency against enclave execution of Intel SGX
☆10Updated 4 years ago
Alternatives and similar repositories for SGXlinger
Users that are interested in SGXlinger are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 2 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆41Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆14Updated 5 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 7 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- ☆18Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 5 years ago
- Repository for synthCT framework (NDSS'22)☆10Updated 2 years ago
- ☆25Updated 2 years ago
- ☆45Updated 6 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Updated 6 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆57Updated 3 weeks ago
- Tools for "Another Flip in the Wall"☆38Updated 7 years ago
- All the tools you need to reproduce the CellIFT paper experiments☆21Updated 4 months ago
- Code examples and paper for the Spoiler-Attack☆16Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- ☆9Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Project Repo for the Simulator Independent Coverage Research☆19Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆16Updated last week
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆25Updated 9 months ago
- ☆17Updated 6 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆17Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago