IAIK / KAISER
Kernel Address Isolation to have Side-channels Efficiently Removed
☆214Updated 3 years ago
Alternatives and similar repositories for KAISER:
Users that are interested in KAISER are comparing it to the libraries listed below
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆70Updated 4 years ago
- MCFI/PICFI tool chain☆42Updated 9 months ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆85Updated 3 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- This repository contains examples of Flush+Flush cache attacks☆154Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 3 years ago
- kCFI Documentation☆14Updated 7 years ago
- ☆63Updated 3 years ago
- Routines for hunting down kernel symbols.☆81Updated 13 years ago
- ☆73Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 8 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆40Updated 6 years ago
- ☆55Updated 2 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆78Updated 5 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- ☆147Updated 6 years ago
- Notes on various topics I'm interested in☆157Updated 9 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆175Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆59Updated 7 years ago
- Linux Kernel Source Tree Reducer☆80Updated 2 months ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- Experimental setup of "Intel MPX explained"☆26Updated 4 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆91Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago