isec-tugraz / dramaView external linksLinks
This repository contains examples of DRAMA reverse-engineering and side-channel attacks
☆194Aug 23, 2017Updated 8 years ago
Alternatives and similar repositories for drama
Users that are interested in drama are comparing it to the libraries listed below
Sorting:
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆246Jan 27, 2024Updated 2 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- ☆153Oct 18, 2018Updated 7 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Jun 19, 2025Updated 7 months ago
- This repository contains examples of Flush+Flush cache attacks☆169Oct 12, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- Tool for testing and finding minimal eviction sets☆107May 6, 2021Updated 4 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆521Jun 15, 2025Updated 7 months ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 7 months ago
- ☆19Jun 20, 2020Updated 5 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 9 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated 2 weeks ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated 3 weeks ago
- ☆48Dec 19, 2018Updated 7 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- ☆197Jun 12, 2024Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Aug 9, 2024Updated last year
- The DrK Attack - Proof of concept☆347Mar 13, 2022Updated 3 years ago
- A simple web based tool for working with assembly / disassembly☆89Feb 3, 2026Updated last week
- Test DRAM for bit flips caused by the rowhammer problem☆992Sep 2, 2015Updated 10 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆44Feb 15, 2024Updated last year
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 3 months ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago