☆113Jul 16, 2023Updated 2 years ago
Alternatives and similar repositories for AEPIC
Users that are interested in AEPIC are comparing it to the libraries listed below
Sorting:
- ☆16Jul 28, 2022Updated 3 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 2 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Jan 23, 2024Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆87Mar 13, 2023Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆48Nov 4, 2022Updated 3 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 4 months ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆278Feb 25, 2026Updated last week
- Research tools developed for Intel Wi-Fi chips☆57Jun 14, 2025Updated 8 months ago
- NAND (JEDEC / ONFI) Analyzer for Saleae Logic☆14Apr 18, 2024Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated last month
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Aug 9, 2024Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Sep 3, 2022Updated 3 years ago
- Elven relativism -- relocation and execution of aarch64 ELF relocatable objects (ET_REL)☆21Oct 13, 2025Updated 4 months ago
- Basic experimentation with Windows drivers.☆17Mar 3, 2023Updated 3 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆43Oct 19, 2022Updated 3 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Feb 23, 2026Updated last week
- ☆1,506Jul 22, 2022Updated 3 years ago
- ☆370Jan 18, 2024Updated 2 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Xyntia, the black-box deobfuscator☆87Dec 11, 2025Updated 2 months ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago