The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures".
☆16Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for gap-attacks
Users that are interested in gap-attacks are comparing it to the libraries listed below
Sorting:
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Aug 28, 2025Updated 6 months ago
- Industrial Hacking Simulator☆27Feb 21, 2026Updated last week
- a blackbox network fuzzer for IoT devices☆56Sep 6, 2024Updated last year
- ☆37Jun 6, 2017Updated 8 years ago
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- OpenCCA: An Open Framework to Enable Arm CCA Research☆20Sep 10, 2025Updated 5 months ago
- ☆38Mar 20, 2017Updated 8 years ago
- A server which listens for web request and creates pebble pins. Can be used to put Monzo transactions onto your pebble timeline☆10Apr 25, 2023Updated 2 years ago
- Mumble Positional Voice Plugin for World of Warcraft 3.3.5☆10Aug 1, 2023Updated 2 years ago
- stateful + logical abstraction layer for react☆10Sep 7, 2022Updated 3 years ago
- Experiments with modal types☆17Oct 20, 2020Updated 5 years ago
- A simple and portable floating-point interval arithmetic library in OCaml☆10May 31, 2022Updated 3 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- A Pretty Printer, based on Philip Wadler's "A prettier printer". But heavily modified to be efficient in a strict language.☆19Mar 20, 2021Updated 4 years ago
- An automated theorem prover for intuitionistic propostional logic☆14Sep 21, 2020Updated 5 years ago
- ☆12Dec 12, 2022Updated 3 years ago
- SGXRay: a bounded verifier for Intel SGX enclaves☆13Sep 10, 2021Updated 4 years ago
- FNV hash collision generator☆12Mar 2, 2017Updated 9 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- ☆11Mar 16, 2016Updated 9 years ago
- Model of baysig language in Haskell (minus estimate)☆15Jun 23, 2016Updated 9 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A web-based self-hosted media gallery focused on simplicity. It displays photos, videos and audios from an album based folder structure i…☆13Jan 10, 2025Updated last year
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- Flash Patch library and example on Nordic Semiconductor's nRF52 Series Device☆12Apr 26, 2016Updated 9 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- Pebble REBBLE watchface☆12Mar 3, 2025Updated last year