crocs-muni / ct-toolsLinks
A repository of tools for verifying constant-timeness
☆18Updated 4 months ago
Alternatives and similar repositories for ct-tools
Users that are interested in ct-tools are comparing it to the libraries listed below
Sorting:
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- Side-channel traces visualizer☆15Updated last month
- MAYO C implementation☆16Updated 2 months ago
- Crypto library☆60Updated this week
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆40Updated last year
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆15Updated last year
- ☆35Updated 8 years ago
- ☆49Updated last week
- Tool to Analyze Speculative Execution Attacks and Mitigations☆55Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated this week
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated last year
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆26Updated last year
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- ☆14Updated this week
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆18Updated 2 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Automatic detection of speculative information flows☆68Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆30Updated last year
- ☆28Updated 3 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated last year
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆40Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago