IAIK / memsec
Framework for building transparent memory encryption and authentication solutions
☆26Updated 6 years ago
Alternatives and similar repositories for memsec:
Users that are interested in memsec are comparing it to the libraries listed below
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- ☆12Updated 3 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- ☆15Updated 2 years ago
- ☆20Updated 3 years ago
- High-order countermeasures for AES and DES☆25Updated 5 months ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 4 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆34Updated 3 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- Thunderclap hardware for Intel Arria 10 FPGA☆32Updated 5 years ago
- ☆34Updated 2 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 7 years ago
- go library for ChipWhisperer hardware security platform☆18Updated 5 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆11Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆34Updated 6 months ago
- ☆16Updated last year
- Eliminating Keystroke Timing Attacks☆21Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ☆14Updated 2 months ago
- QARMA block cipher in C☆26Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- SCALE: Side-Channel Attack Lab. Exercises☆41Updated last year
- Side-channel traces visualizer☆13Updated last month
- ☆19Updated 5 years ago
- Collection of RISC-V exploits☆29Updated 5 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆29Updated 8 years ago
- A repository of tools for verifying constant-timeness☆14Updated last month