falsecurity / cache-leak-detectorLinks
Instruction cache leakage detection tool for modular exponentation software.
☆15Updated 8 years ago
Alternatives and similar repositories for cache-leak-detector
Users that are interested in cache-leak-detector are comparing it to the libraries listed below
Sorting:
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆74Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆21Updated 5 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆36Updated 4 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆35Updated 4 years ago
- TRACER Symbolic Execution Tool☆28Updated 5 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆32Updated 8 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆109Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Traditional Mitigation in GCC to defend Memory Corruption Vulnerability☆21Updated 4 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Secure Virtual Architecture☆42Updated 6 years ago