isec-tugraz / memsecLinks
Framework for building transparent memory encryption and authentication solutions
☆27Updated 6 years ago
Alternatives and similar repositories for memsec
Users that are interested in memsec are comparing it to the libraries listed below
Sorting:
- QARMA block cipher in C☆30Updated 2 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- ☆15Updated 2 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- ☆20Updated 3 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- ☆12Updated 3 years ago
- Differential Address Trace Analysis☆57Updated last year
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- ☆20Updated 5 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- ☆75Updated 6 years ago
- Using SGX to harden password hashing☆34Updated 9 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆55Updated 3 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 8 years ago
- go library for ChipWhisperer hardware security platform☆18Updated 5 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- Eyrie enclave runtime kernel☆36Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆34Updated 2 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 5 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year