luvletter2333 / xz-backdoor-analysisLinks
☆24Updated last year
Alternatives and similar repositories for xz-backdoor-analysis
Users that are interested in xz-backdoor-analysis are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆98Updated last year
- ☆35Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- ☆45Updated last week
- ☆20Updated last year
- ☆112Updated 2 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆72Updated last year
- ☆114Updated 2 years ago
- Simple decompiler for Rizin. It's capable of generating readable pseudo code even on handmade assembly.☆61Updated 5 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆58Updated 3 months ago
- ☆11Updated 2 years ago
- decode bits into bytes☆46Updated 5 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 5 months ago
- ☆49Updated 3 months ago
- Modify a message to have a desired CRC signature.☆124Updated 4 years ago
- ☆70Updated 2 years ago
- ☆12Updated 2 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆266Updated last year
- Determine which CPU architecture is used in a binary file.☆122Updated 7 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆82Updated 10 months ago
- Security payload for next-Gen firmware architecture☆56Updated 5 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year