[arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
☆21Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for DeepRecon
Users that are interested in DeepRecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆13Jun 24, 2021Updated 4 years ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 7 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Python library to collect performance events☆14Jan 30, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- ☆17May 26, 2020Updated 5 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆108Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆23Jan 16, 2023Updated 3 years ago
- ☆13May 26, 2022Updated 3 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- ☆118Nov 14, 2022Updated 3 years ago
- Side Channels Analysis and Deep Learning☆233Dec 31, 2025Updated 2 months ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆31Jan 20, 2026Updated 2 months ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated last month
- Generative Model for Neural Networks☆24Jul 2, 2020Updated 5 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Apr 26, 2018Updated 7 years ago
- 一个旨在整理黑客常用工具的GitHub项目☆12Dec 13, 2023Updated 2 years ago