Deep learning side channel privileged memory reader
☆45Jun 28, 2018Updated 7 years ago
Alternatives and similar repositories for deep_spectre
Users that are interested in deep_spectre are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- ☆11May 22, 2023Updated 2 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆33Apr 27, 2021Updated 4 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Implementation of zRA protocol, a non-interactive method for constructing a transparent remote attestation (RA) protocol based on zkSNARK…☆22Jun 27, 2025Updated 8 months ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- A Livebook Kino for learning how to use the kubereq Elixir library☆14Updated this week
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- 一个定制自己渗透测试的python框架☆14Jun 10, 2021Updated 4 years ago
- MSDN data annotation for radare2☆13Jul 2, 2024Updated last year
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- RISC-V Security HC admin repo☆18Jan 7, 2025Updated last year
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- Butter smooth loading non-jumping images for react that just work☆14Apr 27, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆12Mar 7, 2020Updated 6 years ago
- Tool for testing and finding minimal eviction sets☆106May 6, 2021Updated 4 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- ☆19Jul 5, 2020Updated 5 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Jan 25, 2018Updated 8 years ago
- An emulation of RDMA(remote direct memory access) library☆13Jul 2, 2015Updated 10 years ago