☆15May 30, 2023Updated 2 years ago
Alternatives and similar repositories for hyperbleed
Users that are interested in hyperbleed are comparing it to the libraries listed below
Sorting:
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- ☆73Nov 19, 2022Updated 3 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆59May 8, 2024Updated last year
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Website and PoC collection for transient execution attacks☆204Mar 9, 2024Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- ☆16Nov 28, 2024Updated last year
- ☆17Jun 26, 2025Updated 8 months ago
- ☆14Feb 7, 2023Updated 3 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated 11 months ago
- Linux kernel SGX driver for Graphene☆12Nov 3, 2020Updated 5 years ago
- Data Plane Development Kit☆12Nov 10, 2025Updated 4 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Aug 9, 2024Updated last year
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Dec 8, 2021Updated 4 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Spectre-based Meltdown attack (i.e. 2-in1) proof of concept in 99 lines of code. For more details see 'The Spectre of Meltdowns' present…☆14Jun 21, 2018Updated 7 years ago
- Design and Verification of a Complete Application Specific Integrated Circuit☆12Nov 21, 2016Updated 9 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Mar 11, 2026Updated last week
- QEMU-based Memory Sanitizer for binary software.☆22Nov 19, 2025Updated 4 months ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks ba…☆21Mar 2, 2023Updated 3 years ago
- ☆16Dec 12, 2023Updated 2 years ago
- ☆30Feb 20, 2024Updated 2 years ago
- Task: minimum complete example demonstrating programming using Intel's 'rdpmc' instruction☆22Apr 24, 2023Updated 2 years ago
- rv8 benchmark suite☆24Jul 30, 2020Updated 5 years ago
- ☆21Aug 23, 2021Updated 4 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- 用于抓取网页内容并制作 EPUB 的小工具。☆23Apr 27, 2023Updated 2 years ago