☆22Jun 24, 2019Updated 6 years ago
Alternatives and similar repositories for Flush-Reload
Users that are interested in Flush-Reload are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆54Jun 25, 2019Updated 6 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆21Feb 19, 2020Updated 6 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆198Jun 12, 2024Updated last year
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- Platypus Educational Samples☆23May 21, 2021Updated 4 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 7 years ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- 一个旨在整理黑客常用工具的GitHub项目☆12Dec 13, 2023Updated 2 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆40Jan 27, 2020Updated 6 years ago
- A software cache partitioning tool☆14May 9, 2012Updated 13 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆38Oct 17, 2025Updated 5 months ago
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆16Feb 1, 2019Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Nov 21, 2016Updated 9 years ago
- Simple AMD-V (SVM) Virtualization Extensions Demo☆20Nov 7, 2017Updated 8 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- ☆29Feb 20, 2024Updated 2 years ago
- Code for the benchmarks presented in https://www.usenix.org/conference/atc18/presentation/boucher☆12Apr 18, 2019Updated 6 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Parse and display information about an amd-ucode (CPU microcode) container file☆27Oct 23, 2023Updated 2 years ago
- A source-to-source compiler for optimizing CUDA dynamic parallelism by aggregating launches☆15Jun 21, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- Mirror of the now discontinued ORCA RISC-V processor from VectorBlox.☆10Feb 11, 2020Updated 6 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- ☆17Sep 18, 2025Updated 6 months ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago