A microarchitectural leakage detection framework using dynamic instrumentation.
☆80Nov 15, 2025Updated 3 months ago
Alternatives and similar repositories for Microwalk
Users that are interested in Microwalk are comparing it to the libraries listed below
Sorting:
- ☆12Apr 1, 2025Updated 11 months ago
- ☆11Oct 28, 2020Updated 5 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated last year
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- Checking that functions are constant time with Valgrind☆197Feb 26, 2017Updated 9 years ago
- dude, is my code constant time?☆199Mar 19, 2024Updated last year
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- ☆25Aug 9, 2021Updated 4 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆14Feb 23, 2026Updated last week
- ☆10Jul 29, 2025Updated 7 months ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- Implementation of differential fuzz testing for TLS handshake messages☆11Jul 2, 2021Updated 4 years ago
- a metaprogramming language that compiles from types☆10Jun 26, 2024Updated last year
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Nov 25, 2025Updated 3 months ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Side-channel traces visualizer☆16Apr 28, 2025Updated 10 months ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Corpora used to seed NSS' fuzzing targets☆10Updated this week
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 7 years ago
- ☆17Updated this week
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago