A demo of Flush-Reload style Side-channel attack.
☆10Feb 20, 2019Updated 7 years ago
Alternatives and similar repositories for side-channel-attack
Users that are interested in side-channel-attack are comparing it to the libraries listed below
Sorting:
- ☆11Oct 28, 2020Updated 5 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- ☆198Jun 12, 2024Updated last year
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆127Jan 11, 2018Updated 8 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 8 years ago
- ☆41Feb 25, 2019Updated 7 years ago
- 由于官网的教程写得比较复杂,所以笔者写一个简单的例子☆10Jul 18, 2023Updated 2 years ago
- create concept map from textbook data☆11May 4, 2018Updated 7 years ago
- A dnSpy extension to hot-reload themes☆12Dec 27, 2020Updated 5 years ago
- Source files of Fundamental of Artificial Intelligence in the spring semester of junior (USTC 2020 spring)☆12Aug 9, 2020Updated 5 years ago
- The following will discuss the utilization of FMCW radar for vital sign detection. We employ two types of data: one derived from a public…☆14Jan 26, 2024Updated 2 years ago
- ☆11Jan 12, 2024Updated 2 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- Hook sendto to get the target IP address☆10Apr 24, 2013Updated 12 years ago
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- Experiments with moebius transformations and non-euclidian perspectives.☆12Apr 16, 2023Updated 2 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- ☆11May 3, 2019Updated 6 years ago
- Literature Review/ Summary of methods for extraction of causal relations from text☆10Oct 6, 2021Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- CTL (Computation Tree Logic) SAT solver☆15Feb 10, 2020Updated 6 years ago