isec-tugraz / CJAGLinks
CJAG is an open-source implementation of our cache-based jamming agreement.
☆285Updated 4 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below
Sorting:
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆294Updated 4 years ago
- Microcode parser for AMD, Intel, and VIA processors☆135Updated 10 years ago
- ☆288Updated 9 years ago
- Constant-Time Toolkit☆300Updated 7 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- A public database for software and firmware hashes☆215Updated 9 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆695Updated 3 years ago
- Presentation: Debugging across pipes and sockets with strace☆153Updated 6 years ago
- Wireshark-Specific Dissector Language☆199Updated 8 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 5 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 8 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆325Updated 9 years ago
- Missed optimizations in C compilers☆340Updated 7 years ago
- The dissection of a simple "hello world" ELF binary.☆466Updated 5 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- Simple proof-of-concept for killing a hard-to-kill process☆44Updated 7 years ago
- An instruction trace visualisation tool for dynamic program analysis☆370Updated 3 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- Reverse Engineering Page Table Caches in Your Processor☆374Updated 4 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆404Updated 5 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- ☆472Updated last year
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 6 years ago
- An exploration of code homeomorphism☆380Updated 7 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆250Updated 9 years ago