cla7aye15I4nd / awesome-mcuLinks
Some learning materials, notes and scripts about the programming and security of microcontroller.
☆14Updated 3 years ago
Alternatives and similar repositories for awesome-mcu
Users that are interested in awesome-mcu are comparing it to the libraries listed below
Sorting:
- Pre-Silicon Hardware Fuzzing Toolkit☆60Updated last month
- An open-source deterministic fault attack simulator prototype☆60Updated 4 years ago
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆81Updated 10 months ago
- ConFuzz is an advanced FPGA configuration engine fuzzing and rapid prototyping framework based on boofuzz and OpenOCD.☆15Updated 2 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- This specification is integrated into the Priv. and Unpriv. specifications. This repo is no longer maintained. Please refer to the Priv. …☆92Updated last week
- SiLabs C8051F34x code protection bypass☆68Updated 4 years ago
- SyzTrust's main repository. Start here to install.☆17Updated last year
- Tensilica Xtensa processor module for Ghidra☆17Updated last year
- Artifacts for Cascade: CPU Fuzzing via Intricate Program Generation (USENIX Security 2024)☆135Updated last year
- Student Starter Code for Secure Hardware Design at MIT☆80Updated last year
- Artifact evaluation of paper: MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation☆44Updated 5 months ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆37Updated 3 years ago
- Coresight Access Library☆127Updated 2 months ago
- Spectre based on Linear Address Masking☆69Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆60Updated 3 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data