itewqq / SGX-PTE-SPY
A migration for the page table entry based side-channel attack agains SGX enclaves.
☆15Updated last month
Alternatives and similar repositories for SGX-PTE-SPY:
Users that are interested in SGX-PTE-SPY are comparing it to the libraries listed below
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- ☆37Updated 11 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- A tool to perform so called BGE attack☆24Updated 11 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated last month
- Linux kernel branches for confidential compute research☆17Updated last month
- minimum ELF64 program to calculate its own SHA256.☆18Updated 2 years ago
- Kernel Read Write Execute☆40Updated 2 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆55Updated 10 months ago
- ☆20Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆36Updated 2 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆44Updated last year
- Vulnerability analyze☆15Updated 4 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆34Updated 3 months ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆13Updated 2 years ago
- ☆62Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆16Updated 10 months ago
- Binary Only Thread Sanitizer☆12Updated 7 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year
- linux kernel cross page attack demo module☆30Updated last year
- ☆20Updated 5 months ago