opencomputeproject / SecurityLinks
Security Project
☆88Updated 2 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below
Sorting:
- ☆22Updated 3 years ago
- Tear the firmware apart with your bare hands;-)☆189Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- ☆34Updated 2 years ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- ☆31Updated 4 years ago
- embedded-iot_profile☆104Updated 4 years ago
- Security payload for next-Gen firmware architecture☆52Updated last month
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆64Updated last month
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆243Updated 7 years ago
- Security and Privacy Research at Microsoft☆41Updated 8 months ago
- An open-source deterministic fault attack simulator prototype☆58Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Pre-OS microcode updater☆43Updated 6 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Coresight Access Library☆122Updated 3 weeks ago
- QNX and BB10 Security Tools☆165Updated 9 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- ☆76Updated 6 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 6 years ago
- TRRespass☆124Updated 4 years ago
- OWASP Embedded Application Security Project☆16Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- Abstraction layer for Xilinx FPGAs☆15Updated 5 years ago
- Thunderclap hardware for Intel Arria 10 FPGA☆32Updated 6 years ago
- baseband security research☆84Updated 4 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago