isec-tugraz / CJAGLinks
CJAG is an open-source implementation of our cache-based jamming agreement.
☆284Updated 3 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below
Sorting:
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆291Updated 3 years ago
- Constant-Time Toolkit☆297Updated 6 years ago
- A public database for software and firmware hashes☆216Updated 8 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- ☆287Updated 9 years ago
- Presentation: Debugging across pipes and sockets with strace☆152Updated 6 years ago
- Wireshark-Specific Dissector Language☆198Updated 8 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 9 years ago
- The dissection of a simple "hello world" ELF binary.☆464Updated 4 years ago
- Missed optimizations in C compilers☆341Updated 7 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- How to backdoor Diffie-Hellman☆615Updated 9 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆683Updated 3 years ago
- ☆470Updated 9 months ago
- Educational SSH client☆124Updated 9 years ago
- Intel Management Engine JTAG Proof of Concept☆521Updated 5 years ago
- Enable piping of internal command output to external commands☆71Updated 7 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 6 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆514Updated 2 months ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆248Updated 8 years ago
- An exploration of code homeomorphism☆381Updated 7 years ago