☆11Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for ct-fuzz
Users that are interested in ct-fuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆38Mar 20, 2017Updated 9 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 2 months ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆21Feb 19, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆41Feb 25, 2019Updated 7 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/☆58Aug 14, 2023Updated 2 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- LLVM assembly syntax highlighting and snippets☆14Jan 24, 2026Updated 2 months ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The MobSTr dataset provides artifacts that demonstrate Model-based Safety Assurance and Traceability for a safety-critical automotive sys…☆10Mar 18, 2022Updated 4 years ago
- A collection of awesome and useful resources for research.☆25Jun 5, 2025Updated 9 months ago
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- A model checker for relational first-order temporal specifications☆29Jul 6, 2021Updated 4 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- A simple and portable floating-point interval arithmetic library in OCaml☆10May 31, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 4 months ago
- ☆13Apr 9, 2022Updated 3 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- A Pretty Printer, based on Philip Wadler's "A prettier printer". But heavily modified to be efficient in a strict language.☆19Mar 20, 2021Updated 5 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- Systematic Protocol Analysis Project☆11Jun 13, 2017Updated 8 years ago
- FNV hash collision generator☆12Mar 2, 2017Updated 9 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆55May 24, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Model of baysig language in Haskell (minus estimate)☆15Jun 23, 2016Updated 9 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago