cispa / browser-cpu-fingerprintingLinks
This repository contains the code for our paper "Browser-based CPU Fingerprinting".
☆40Updated 2 years ago
Alternatives and similar repositories for browser-cpu-fingerprinting
Users that are interested in browser-cpu-fingerprinting are comparing it to the libraries listed below
Sorting:
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆40Updated 3 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆69Updated 4 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated last year
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆15Updated 2 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆12Updated 5 months ago
- Tool for testing and finding minimal eviction sets☆103Updated 4 years ago
- ☆36Updated 4 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆57Updated 3 years ago
- ☆24Updated last year
- ☆48Updated 2 years ago
- Fuzzing framework to target native components of android applications☆20Updated 2 years ago
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆124Updated this week
- Some tee/trustzone helper stuff☆53Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆34Updated 5 years ago
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆53Updated 2 months ago
- Differential Address Trace Analysis☆57Updated last year
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆21Updated 3 years ago
- Solutions to https://cryptopals.com problems☆28Updated last month
- ☆15Updated 4 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆83Updated last month
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 5 years ago