flxwu / spectre-attack-demoLinks
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
☆87Updated 7 years ago
Alternatives and similar repositories for spectre-attack-demo
Users that are interested in spectre-attack-demo are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Code examples and paper for the Spoiler-Attack☆16Updated 6 years ago
- Tracing framework for full system simulators☆56Updated 9 years ago
- Deep learning side channel privileged memory reader☆45Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆14Updated 5 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- My minimal PoC for spectre☆40Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆305Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆185Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Spectre exploit☆55Updated 7 years ago
- ☆77Updated 7 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- ☆45Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- ☆149Updated 6 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆55Updated 3 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Mirror of lascar (https://github.com/Ledger-Donjon/lascar)☆14Updated 6 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆244Updated 7 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆542Updated 7 years ago