lgeek / spec_poc_armLinks
Dump privileged ARM system registers from usermode using variant 3a of Meltdown
☆245Updated 7 years ago
Alternatives and similar repositories for spec_poc_arm
Users that are interested in spec_poc_arm are comparing it to the libraries listed below
Sorting:
- ☆56Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Updated 4 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Updated 6 years ago
- Nailgun attack on ARM devices.☆164Updated 4 years ago
- Hardware-assisted Data-flow Isolation☆29Updated 7 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆85Updated 12 years ago
- Test suite for the Linux perf_event subsystem☆118Updated 5 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Updated 2 months ago
- Open-source release for MemSentry (EuroSys'17)☆47Updated 4 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆32Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Updated 8 years ago
- ☆74Updated 6 years ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- ☆77Updated 7 years ago
- Automatic Compartments for Embedded Systems☆24Updated 5 years ago
- Tools for "Another Flip in the Wall"☆40Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- MCFI/PICFI tool chain☆44Updated last year
- Android driver for the Trusted Execution Environment <t-base☆12Updated 10 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- Tool for testing and finding minimal eviction sets☆107Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- ☆47Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Updated 5 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 10 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago