A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation
☆15Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for rowhammer-revisited-talk
Users that are interested in rowhammer-revisited-talk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- LLM play 20questions with itself☆13Mar 31, 2023Updated 2 years ago
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Notes from learning RISC-V☆12Mar 13, 2026Updated 2 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Oct 18, 2024Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆45Oct 19, 2022Updated 3 years ago
- A simple implementation of the 20Q game with an ANN, built as a major project for COMP9417 @ UNSW☆19Sep 23, 2017Updated 8 years ago
- The CTF questions about smart contracts☆11Sep 1, 2018Updated 7 years ago
- Run test on demand with support for many test runners☆10Aug 13, 2024Updated last year
- The Python Opportunistic Network Simulator. Run DTN simulations using SimPy.☆11Jul 25, 2025Updated 8 months ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- misc scripts☆21Mar 2, 2026Updated 3 weeks ago
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Feb 21, 2026Updated last month
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- Automatic Software-based Protection and Integrity Suite☆20Mar 2, 2026Updated 3 weeks ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Nov 25, 2025Updated 4 months ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆22Nov 1, 2025Updated 4 months ago
- Repository for the current status of the LESS submission☆13Mar 16, 2026Updated 2 weeks ago
- ☆16Apr 6, 2023Updated 2 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated 2 weeks ago
- go library for ChipWhisperer hardware security platform☆21Aug 1, 2019Updated 6 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- A portable, easy to use, readable and flexible SSL library (dual-licensed, with FOSS exceptions)☆24Aug 6, 2025Updated 7 months ago