Sen-Deng / CipherHLinks
CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
☆14Updated last year
Alternatives and similar repositories for CipherH
Users that are interested in CipherH are comparing it to the libraries listed below
Sorting:
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆13Updated last year
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆14Updated last year
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- ☆23Updated 3 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- ☆22Updated 4 years ago
- ☆27Updated last year
- The open-source component of Prime+Scope, published at CCS 2021☆31Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 4 months ago
- Code for tracelet-level symbolic execution☆18Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 2 months ago
- ☆14Updated 3 years ago
- ☆32Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆12Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 8 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- Proof-of-Concept of the Frontal Attack☆10Updated last year
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆41Updated 10 months ago
- ☆22Updated 3 months ago
- ☆10Updated last year
- ☆38Updated last year
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- Reload+Refresh PoC☆15Updated 5 years ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆14Updated 2 years ago
- ☆61Updated 2 years ago
- ☆33Updated 2 years ago
- Automatic detection of speculative information flows☆68Updated 3 years ago