michael-emmi / ct-fuzzView external linksLinks
☆11Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for ct-fuzz
Users that are interested in ct-fuzz are comparing it to the libraries listed below
Sorting:
- ☆38Mar 20, 2017Updated 8 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 5 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 6 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated last month
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated 11 months ago
- A Tool for the Static Analysis of Cache Side Channels☆40Mar 5, 2017Updated 8 years ago
- ☆41Feb 25, 2019Updated 6 years ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆34Jan 25, 2025Updated last year
- QCRAFT AutoScheduler: a library that allows users to automatically schedule the execution of their own quantum circuits, improving effici…☆18Oct 28, 2025Updated 3 months ago
- A collection of awesome and useful resources for research.☆25Jun 5, 2025Updated 8 months ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 2 months ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 7 months ago
- A model checker for relational first-order temporal specifications☆29Jul 6, 2021Updated 4 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- The MobSTr dataset provides artifacts that demonstrate Model-based Safety Assurance and Traceability for a safety-critical automotive sys…☆10Mar 18, 2022Updated 3 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- ☆36Jun 19, 2019Updated 6 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated 3 weeks ago
- VLESS-XTLS-uTLS-REALITY setup script.☆11May 3, 2023Updated 2 years ago
- The Unified TileLink Memory Subsystem Tester for XiangShan☆12Jan 7, 2026Updated last month
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- gcnano-binaries☆11Nov 27, 2025Updated 2 months ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 10 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/☆57Aug 14, 2023Updated 2 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- Literature Review/ Summary of methods for extraction of causal relations from text☆10Oct 6, 2021Updated 4 years ago