isec-tugraz / prefetch
This repository contains several tools to perform Prefetch Side-Channel Attacks
☆57Updated 8 years ago
Alternatives and similar repositories for prefetch:
Users that are interested in prefetch are comparing it to the libraries listed below
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- ☆23Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆57Updated 10 months ago
- ☆35Updated 3 years ago
- ☆96Updated 5 years ago
- ☆53Updated 5 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆56Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated last year
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆37Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 5 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆82Updated last month
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆123Updated 4 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆34Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 10 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆42Updated 2 years ago
- ☆45Updated 3 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- run AFL with pintool☆65Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago