isec-tugraz / CJAG
CJAG is an open-source implementation of our cache-based jamming agreement.
☆282Updated 3 years ago
Alternatives and similar repositories for CJAG:
Users that are interested in CJAG are comparing it to the libraries listed below
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- Missed optimizations in C compilers☆342Updated 6 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆286Updated 3 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆159Updated 9 months ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Constant-Time Toolkit☆295Updated 6 years ago
- Inline C/asm in Bash☆250Updated 7 years ago
- Microcode parser for AMD, Intel, and VIA processors☆133Updated 9 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Presentation: Debugging across pipes and sockets with strace☆151Updated 5 years ago
- The engine that powers DeLorean!☆832Updated 5 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆513Updated 4 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆672Updated 2 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 6 years ago
- Simple Driver code for vmlaunch☆159Updated 7 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 8 years ago
- ☆283Updated 8 years ago
- Enable piping of internal command output to external commands☆71Updated 6 years ago
- Wireshark-Specific Dissector Language☆197Updated 7 years ago
- An exploration of code homeomorphism☆372Updated 6 years ago
- A list of publicly known but unfixed security bugs☆237Updated 6 years ago
- Reverse Engineering Page Table Caches in Your Processor☆367Updated 3 years ago
- Toy container runtime, capable of running docker images☆67Updated 3 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆401Updated 4 years ago
- Haka runtime☆449Updated 7 years ago
- The dissection of a simple "hello world" ELF binary.☆461Updated 4 years ago
- x86 (MS-DOS) documentation, disassembler and emulator - WIP☆308Updated 8 years ago