IAIK / memsec
Framework for building transparent memory encryption and authentication solutions
☆25Updated 6 years ago
Related projects: ⓘ
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆40Updated 6 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆36Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 4 years ago
- ☆12Updated 3 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 7 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- QARMA block cipher in C☆24Updated 2 years ago
- ☆34Updated last year
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆28Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated last month
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆28Updated 8 years ago
- ☆20Updated 2 years ago
- SD/MMC Analyzer for Saleae Logic☆35Updated 6 months ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 2 years ago
- AVX2 Chacha implementation☆16Updated 10 years ago
- Tracing framework for full system simulators☆54Updated 9 years ago
- Side-channel traces visualizer☆13Updated 6 months ago
- Thunderclap hardware for Intel Arria 10 FPGA☆31Updated 5 years ago
- ☆30Updated this week
- High-order countermeasures for AES and DES☆25Updated last month
- XML representation of the x86 instruction set☆27Updated last year
- ☆70Updated 4 years ago
- ☆15Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- betrusted.io main SoC design☆12Updated 4 years ago
- ☆19Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year