danpage / mascabLinks
MASCAB: a Micro-Architectural Side-Channel Attack Bibliography
☆41Updated 7 years ago
Alternatives and similar repositories for mascab
Users that are interested in mascab are comparing it to the libraries listed below
Sorting:
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Tools for "Another Flip in the Wall"☆39Updated 7 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- ☆152Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆32Updated 8 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- ☆55Updated 3 years ago
- ☆65Updated 4 years ago
- kCFI Documentation☆14Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- ☆23Updated 6 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18Updated 10 years ago
- ☆49Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- ☆36Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆77Updated 7 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆189Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago