isec-tugraz / memsecLinks
Framework for building transparent memory encryption and authentication solutions
☆27Updated 7 years ago
Alternatives and similar repositories for memsec
Users that are interested in memsec are comparing it to the libraries listed below
Sorting:
- QARMA block cipher in C☆31Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 5 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Updated 2 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Differential Address Trace Analysis☆61Updated last year
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- ☆20Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆79Updated 3 weeks ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- ☆20Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆222Updated 3 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 3 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 6 years ago
- ☆77Updated 7 years ago
- Thunderclap hardware for Intel Arria 10 FPGA☆33Updated 6 years ago
- ☆17Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆45Updated 2 weeks ago
- ☆35Updated 2 years ago
- Go Trusted Execution Environment (TEE)☆140Updated 3 months ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago