nccgroup / cachegrab
a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
☆79Updated 5 years ago
Alternatives and similar repositories for cachegrab:
Users that are interested in cachegrab are comparing it to the libraries listed below
- Kernel Address Isolation to have Side-channels Efficiently Removed☆215Updated 3 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆53Updated 8 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 7 years ago
- Qualcomm TrustZone kernel privilege escalation☆62Updated 8 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆34Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆60Updated 9 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Linux Kernel Source Tree Reducer☆80Updated 3 months ago
- Differential fault analysis framework for AES128☆47Updated 11 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Emulating Exynos 4210 BootROM in QEMU☆71Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆59Updated 7 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆42Updated last year
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- ☆70Updated 4 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆147Updated 5 years ago
- ☆55Updated 2 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- ☆28Updated 2 years ago
- Differential Address Trace Analysis☆54Updated 10 months ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆85Updated 6 years ago