Code examples and paper for the Spoiler-Attack
☆17May 28, 2019Updated 6 years ago
Alternatives and similar repositories for Spoiler
Users that are interested in Spoiler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆14Jun 22, 2023Updated 2 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hardware performance counter tool for Windows OS☆18Sep 4, 2018Updated 7 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Tool for testing and finding minimal eviction sets☆106May 6, 2021Updated 4 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- Multiple approaches to statistical simulation for computer architects☆14Jun 1, 2020Updated 5 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Apr 22, 2023Updated 2 years ago
- original 8bit CPU of ICF3-Z☆12Feb 20, 2020Updated 6 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- Minimal OpenCL program on Windows☆20Oct 20, 2023Updated 2 years ago
- Stony Brook University CFI library☆22Sep 30, 2014Updated 11 years ago
- oneAPI Deep Neural Network Library (oneDNN)☆10Feb 2, 2022Updated 4 years ago
- Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆55Jun 25, 2019Updated 6 years ago
- Some tools for CTF off line☆19Nov 19, 2017Updated 8 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Encodes and decodes CWT, EAT and similar format tokens. It supports COSE format signing and verification as well as the UCCS unsigned for…☆11Jul 23, 2022Updated 3 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆91Oct 19, 2021Updated 4 years ago
- ☆12Jun 1, 2023Updated 2 years ago
- RTL-SDR 433MHz signal recovery with MATLAB☆12Feb 13, 2015Updated 11 years ago
- RFC Template in LaTeX☆15Oct 29, 2018Updated 7 years ago
- The official repository of metro-mpi☆18Sep 3, 2025Updated 7 months ago
- Hi-DMM: High-Performance Dynamic Memory Management in HLS (High-Level Synthesis)☆25Oct 30, 2018Updated 7 years ago
- Tools for experimenting with Running Average Power Limit (RAPL)☆18Jan 7, 2018Updated 8 years ago
- ZPU - the worlds smallest 32 bit CPU with GCC toolchain☆16Jul 17, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- Cryptanalysis on differents algorithms with z3 solver sat☆18Aug 5, 2024Updated last year
- IceHe's Library: https://icehe.life☆18Feb 3, 2026Updated 2 months ago
- ☆17Aug 25, 2022Updated 3 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago