Working Set Page Cache side-channel IPC PoC
☆67Jan 9, 2019Updated 7 years ago
Alternatives and similar repositories for wsIPC
Users that are interested in wsIPC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- ☆13Apr 27, 2020Updated 5 years ago
- Automated test generator to detectcache side channel leakages.☆11Jul 1, 2019Updated 6 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- x86 virtualization study notes using Intel VT-x☆22Jan 3, 2014Updated 12 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- Microbenchmarking experiments on Zen 2 machines☆22Jun 25, 2022Updated 3 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆21Feb 19, 2020Updated 6 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆20Nov 27, 2023Updated 2 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- ☆48Dec 19, 2018Updated 7 years ago
- ☆24Feb 19, 2017Updated 9 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Javascript game using three.js☆12Nov 23, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Using a modified version of DirtySanta, you can gain flash a boot.img to any Android device. Useful for unlocked bootloaders or userdebug…☆12Dec 28, 2016Updated 9 years ago
- A collection of slides of the SMT course I held at University of Milan in fall 2011☆10Mar 14, 2015Updated 11 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- TLB splitting module for the Bareflank Hypervisor.☆12Sep 23, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Enabled / Disable LSA Protection via BYOVD☆81Dec 8, 2021Updated 4 years ago