Yossioren / pp0Links
Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"
☆40Updated 3 years ago
Alternatives and similar repositories for pp0
Users that are interested in pp0 are comparing it to the libraries listed below
Sorting:
- Tool for testing and finding minimal eviction sets☆103Updated 4 years ago
- Tools for "Another Flip in the Wall"☆38Updated 7 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- ☆48Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆40Updated 2 years ago
- ☆36Updated 4 years ago
- ☆149Updated 6 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Boring tool to launch multiple afl-fuzz instances☆50Updated 7 years ago
- ☆190Updated last year
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆57Updated 3 weeks ago
- ☆25Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated last year
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Website and PoC collection for transient execution attacks☆183Updated last year
- ☆189Updated 2 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- ☆78Updated 4 years ago
- ☆89Updated last week
- Kernel Address Isolation to have Side-channels Efficiently Removed☆222Updated 3 years ago
- ☆15Updated 5 years ago
- Target-centric program analysis.☆76Updated this week
- Practical Data-Only Attack Generation☆40Updated last year
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago