A microarchitectural leakage detection framework using dynamic instrumentation.
☆82Nov 15, 2025Updated 5 months ago
Alternatives and similar repositories for Microwalk
Users that are interested in Microwalk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Nov 14, 2022Updated 3 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆64Aug 7, 2022Updated 3 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- A Tool for the Static Analysis of Cache Side Channels☆43Mar 5, 2017Updated 9 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆38Jul 18, 2023Updated 2 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- ☆37Mar 20, 2017Updated 9 years ago
- Website and PoC collection for transient execution attacks☆204Mar 9, 2024Updated 2 years ago
- Checking that functions are constant time with Valgrind☆202Feb 26, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 6 months ago
- dude, is my code constant time?☆204Mar 19, 2024Updated 2 years ago
- ☆29Feb 20, 2024Updated 2 years ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Nov 30, 2021Updated 4 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Apr 3, 2026Updated last month
- ☆44Jul 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆45Oct 19, 2022Updated 3 years ago
- ☆64Mar 5, 2026Updated 2 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Apr 26, 2026Updated last week
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆143Jul 10, 2021Updated 4 years ago
- Differential Address Trace Analysis☆63Mar 27, 2024Updated 2 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆16Apr 14, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆22Feb 19, 2020Updated 6 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Feb 20, 2021Updated 5 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆12Jul 2, 2021Updated 4 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 8 years ago
- Code repository for Coppelia tool☆24Nov 12, 2020Updated 5 years ago