s8lvg / rowhammer-revisited-talkView external linksLinks
A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation
☆15Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for rowhammer-revisited-talk
Users that are interested in rowhammer-revisited-talk are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 2 months ago
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆42Oct 19, 2022Updated 3 years ago
- The CTF questions about smart contracts☆11Sep 1, 2018Updated 7 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆17Nov 25, 2025Updated 2 months ago
- ☆12Jun 22, 2021Updated 4 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Sep 18, 2020Updated 5 years ago
- ☆12Apr 1, 2025Updated 10 months ago
- The Python Opportunistic Network Simulator. Run DTN simulations using SimPy.☆11Jul 25, 2025Updated 6 months ago
- Griffinfly is COSIC's submission to the ZPRIZE competition under the category, Accelerating NTT Operations on an FPGA by Michiel Van Beir…☆11Feb 13, 2023Updated 3 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- Run test on demand with support for many test runners☆10Aug 13, 2024Updated last year
- LLM play 20questions with itself☆12Mar 31, 2023Updated 2 years ago
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Nov 26, 2025Updated 2 months ago
- OP-TEE integration for the MS TPM 2.0 Reference Implementation (fTPM)☆18Jan 16, 2026Updated last month
- Repository for the current status of the LESS submission☆14Feb 4, 2026Updated last week
- ☆13Nov 2, 2023Updated 2 years ago
- Automatic Software-based Protection and Integrity Suite☆19Aug 26, 2025Updated 5 months ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- ☆16Oct 18, 2024Updated last year
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- ☆35Feb 10, 2026Updated last week
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- claude code, codex, gemini cli, kimi cli - all in one by acp☆45Dec 16, 2025Updated 2 months ago
- ☆16Apr 6, 2023Updated 2 years ago
- go library for ChipWhisperer hardware security platform☆20Aug 1, 2019Updated 6 years ago
- Hardware implementation of Saber☆10Jul 14, 2020Updated 5 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- Short proof-of-concepts for STM32 boards using a very minimal interface☆18Jan 29, 2018Updated 8 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆21Nov 9, 2021Updated 4 years ago
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- VexRiscv reference platforms for the pqriscv project☆16Mar 9, 2024Updated last year
- SHA3 (KECCAK)☆18Jul 17, 2014Updated 11 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago