flxwu / spectre-attack-demoLinks
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
☆87Updated 7 years ago
Alternatives and similar repositories for spectre-attack-demo
Users that are interested in spectre-attack-demo are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
 - A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
 - Code examples and paper for the Spoiler-Attack☆17Updated 6 years ago
 - Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
 - ☆77Updated 7 years ago
 - ☆152Updated 7 years ago
 - This repository contains several tools to perform Cache Template Attacks☆157Updated 3 weeks ago
 - This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆25Updated 5 years ago
 - SCALE: Side-Channel Attack Lab. Exercises☆43Updated 2 years ago
 - Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆15Updated 6 years ago
 - L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
 - Tools for "Another Flip in the Wall"☆39Updated 7 years ago
 - This repository contains examples of Flush+Flush cache attacks☆167Updated 4 years ago
 - MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
 - Tracing framework for full system simulators☆57Updated 10 years ago
 - ☆46Updated 6 years ago
 - [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 7 years ago
 - Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
 - This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆188Updated 8 years ago
 - ☆195Updated last year
 - This is an attempt to implement Spectre on ARMv7☆25Updated 7 years ago
 - Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
 - Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
 - SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
 - Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
 - A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
 - Code to evaluate XLATE attacks as well existing cache attacks.☆31Updated 7 years ago
 - ☆34Updated 7 years ago
 - Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
 - ☆23Updated 6 years ago