isec-tugraz / memsec
Framework for building transparent memory encryption and authentication solutions
☆27Updated 6 years ago
Alternatives and similar repositories for memsec:
Users that are interested in memsec are comparing it to the libraries listed below
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- ☆12Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- QARMA block cipher in C☆27Updated 2 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 3 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 8 years ago
- ☆16Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆49Updated 8 months ago
- ☆20Updated 3 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- ☆20Updated 5 years ago
- Side-channel traces visualizer☆14Updated this week
- Differential Address Trace Analysis☆55Updated last year
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- A repository of tools for verifying constant-timeness☆18Updated 2 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- ☆16Updated last year
- ☆34Updated 2 years ago
- Eliminating Keystroke Timing Attacks☆21Updated 7 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆16Updated last week
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago