feruxmax / meltdownLinks
Meltdown/Spectre experiments
☆54Updated 7 years ago
Alternatives and similar repositories for meltdown
Users that are interested in meltdown are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- Meltdown/Spectre PoC src collection.☆509Updated 7 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆26Updated 5 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆27Updated 7 years ago
- Automated test generator to detectcache side channel leakages.☆11Updated 6 years ago
- ☆55Updated 3 years ago
- ☆22Updated 3 years ago
- MCFI/PICFI tool chain☆43Updated last year
- Security benchmarks for the Internet of Things☆22Updated 4 years ago
- ☆61Updated 3 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- K-Miner☆75Updated 6 years ago
- Stony Brook University CFI library☆22Updated 10 years ago
- ☆53Updated 6 years ago
- ☆24Updated 4 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- ☆17Updated 5 years ago
- ☆44Updated 5 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆43Updated 4 years ago
- ☆22Updated 4 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Updated 7 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 5 years ago
- Artifact evaluation of paper: MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation☆30Updated 4 months ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆21Updated 8 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆54Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆13Updated 4 years ago