☆113Jul 16, 2023Updated 2 years ago
Alternatives and similar repositories for AEPIC
Users that are interested in AEPIC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jul 28, 2022Updated 3 years ago
- ☆46Jul 19, 2023Updated 2 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆88Mar 13, 2023Updated 3 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 3 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆279Feb 25, 2026Updated last month
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 4 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated 2 months ago
- Basic experimentation with Windows drivers.☆17Mar 3, 2023Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Jan 23, 2024Updated 2 years ago
- ☆25Aug 9, 2023Updated 2 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆21Nov 23, 2023Updated 2 years ago
- Revizor - Hardware fuzzing for the age of speculation☆182Mar 4, 2026Updated 3 weeks ago
- Spectre based on Linear Address Masking☆67Dec 4, 2023Updated 2 years ago
- ☆10May 12, 2023Updated 2 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆45Oct 19, 2022Updated 3 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Aug 12, 2024Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆21Nov 25, 2025Updated 4 months ago
- A library for performing memory forensics over the IEEE 1394 interface.☆19Jul 8, 2018Updated 7 years ago
- Reload+Refresh PoC☆16Feb 26, 2020Updated 6 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated last month
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Jul 10, 2021Updated 4 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- ☆76Mar 11, 2024Updated 2 years ago