Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
☆87Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for spectre-attack-demo
Users that are interested in spectre-attack-demo are comparing it to the libraries listed below
Sorting:
- Workshop collections of Firecracker.☆13Aug 2, 2020Updated 5 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Jan 28, 2023Updated 3 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆127Jan 11, 2018Updated 8 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Code examples and paper for the Spoiler-Attack☆17May 28, 2019Updated 6 years ago
- Port of EDK2 implementation of UEFI to RISC-V. See documentation at:☆17Nov 15, 2021Updated 4 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- ☆18Sep 2, 2020Updated 5 years ago
- ☆20Mar 1, 2021Updated 5 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- Implementation of Deepmind's AlphaZero algorithm with Caffe and C++☆20Apr 14, 2018Updated 7 years ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Dec 16, 2022Updated 3 years ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Skeleton code for new 6.858 final project --- an encrypted and authenticated file system☆24Apr 20, 2022Updated 3 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆774Jan 10, 2018Updated 8 years ago
- Apio examples☆37Updated this week
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- Demo host and enclave applications exercising most functionality.☆32Jun 12, 2023Updated 2 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆36Feb 21, 2024Updated 2 years ago
- A design automation framework to engineer decision diagrams yourself☆25Updated this week
- DAG-based blockchain☆10Apr 20, 2019Updated 6 years ago
- ☆30Dec 12, 2021Updated 4 years ago
- Eyrie enclave runtime kernel☆37Aug 2, 2023Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Kernel module that makes it possible to create virtual wifi devices each with a virtualized stack.☆11Dec 13, 2011Updated 14 years ago
- BOLOS community enclave for SGX & simulator☆36Feb 2, 2020Updated 6 years ago
- A Verilog Synthesis Regression Test☆37Jan 19, 2026Updated last month
- This is a hanabi AI bot that can play on http://keldon.net/hanabi/☆11May 29, 2017Updated 8 years ago