isec-tugraz / CJAGLinks
CJAG is an open-source implementation of our cache-based jamming agreement.
☆284Updated 3 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below
Sorting:
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆292Updated 3 years ago
- Constant-Time Toolkit☆299Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Missed optimizations in C compilers☆340Updated 7 years ago
- Inline C/asm in Bash☆252Updated 8 years ago
- ☆288Updated 9 years ago
- Wireshark-Specific Dissector Language☆198Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- The dissection of a simple "hello world" ELF binary.☆463Updated 4 years ago
- Presentation: Debugging across pipes and sockets with strace☆153Updated 6 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 6 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- Simple proof-of-concept for killing a hard-to-kill process☆44Updated 7 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆403Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆325Updated 9 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆250Updated 8 years ago
- The engine that powers DeLorean!☆836Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- ☆89Updated 9 years ago
- Intel Management Engine JTAG Proof of Concept☆526Updated 5 years ago
- ☆470Updated 11 months ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆687Updated 3 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago