IAIK / drama
This repository contains examples of DRAMA reverse-engineering and side-channel attacks
☆169Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for drama
- This repository contains several tools to perform Cache Template Attacks☆141Updated last year
- ☆145Updated 6 years ago
- This repository contains examples of Flush+Flush cache attacks☆154Updated 3 years ago
- ☆181Updated 4 months ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 2 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆57Updated 7 years ago
- Tool for testing and finding minimal eviction sets☆95Updated 3 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆281Updated 2 years ago
- Website and PoC collection for transient execution attacks☆169Updated 8 months ago
- Tools for "Another Flip in the Wall"☆35Updated 6 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆89Updated 7 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆60Updated 2 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆165Updated 8 years ago
- Notes on various topics I'm interested in☆157Updated 9 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆85Updated 3 years ago
- ☆44Updated 5 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆302Updated last year
- Reverse Engineering Page Table Caches in Your Processor☆365Updated 3 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆35Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆18Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆183Updated 2 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆40Updated 6 years ago
- TRRespass☆120Updated 3 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆19Updated 7 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- ☆19Updated 4 years ago
- ☆70Updated 4 years ago
- ☆72Updated 6 years ago