itewqq / SGX-PTE-SPYLinks
A migration for the page table entry based side-channel attack agains SGX enclaves.
☆19Updated 11 months ago
Alternatives and similar repositories for SGX-PTE-SPY
Users that are interested in SGX-PTE-SPY are comparing it to the libraries listed below
Sorting:
- ☆75Updated last year
- ☆27Updated last year
- Spectre based on Linear Address Masking☆68Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆23Updated 5 months ago
- ☆62Updated 10 months ago
- Materials for my DMA attacks talk and a collection of related links☆63Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year
- ☆35Updated 9 months ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆34Updated 3 years ago
- ☆35Updated 11 months ago
- ☆14Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- ☆38Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆68Updated 2 months ago
- ☆33Updated 2 years ago
- Binary exploitation by confusing the unwinder☆68Updated 2 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Updated 11 months ago
- ☆23Updated 2 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆80Updated 11 months ago
- A tool to perform so called BGE attack☆26Updated 7 months ago
- Kernel Read Write Execute☆46Updated last year
- ☆58Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 8 months ago
- ☆133Updated last week
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year