Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s Stack Engine" (USENIX Security 2026)
☆84Jan 30, 2026Updated last month
Alternatives and similar repositories for StackWarp
Users that are interested in StackWarp are comparing it to the libraries listed below
Sorting:
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- ☆62Mar 4, 2025Updated 11 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Feb 20, 2026Updated last week
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Microbenchmarking experiments on Zen 2 machines☆21Jun 25, 2022Updated 3 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated 2 years ago
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆44Feb 15, 2024Updated 2 years ago
- ☆12Apr 1, 2025Updated 10 months ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated last month
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆17Nov 25, 2025Updated 3 months ago
- ☆17Sep 25, 2024Updated last year
- ☆64Nov 4, 2025Updated 3 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆15Aug 28, 2023Updated 2 years ago
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Jan 7, 2026Updated last month
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- ☆21Feb 18, 2025Updated last year
- ☆20Nov 27, 2023Updated 2 years ago
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆39Jul 29, 2022Updated 3 years ago
- A framework to quantify Web3-based browser fingerprinting and wallet address leakage (USENIX 2023).☆13Aug 8, 2023Updated 2 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated last month
- llvm powered deobfuscation of a vm-based protection☆47Updated this week
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated 11 months ago
- Zydis JavaScript bindings via WASM☆21Mar 28, 2023Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4