IAIK / keydrown
Eliminating Keystroke Timing Attacks
☆21Updated 6 years ago
Related projects: ⓘ
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆40Updated 6 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 7 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆28Updated 8 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆41Updated last year
- Tools for "Another Flip in the Wall"☆35Updated 6 years ago
- kCFI Documentation☆14Updated 7 years ago
- ☆22Updated 5 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- OpenVPN is an open source VPN daemon☆32Updated 6 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆73Updated 4 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- ☆145Updated 5 years ago
- ☆40Updated this week
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- ☆72Updated 6 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 6 years ago
- lte security☆41Updated 8 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 2 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆49Updated 8 years ago
- This is an attempt to implement Spectre on ARMv7☆24Updated 6 years ago
- Fuzzer☆43Updated 9 years ago
- ☆38Updated this week
- Preventing code-reuse attacks by stopping code pointer leakages☆35Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 5 years ago
- Recon materials☆28Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 5 years ago
- Binary Analysis Platform☆73Updated 10 years ago