A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation
☆15Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for rowhammer-revisited-talk
Users that are interested in rowhammer-revisited-talk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- LLM play 20questions with itself☆13Mar 31, 2023Updated 3 years ago
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆28Nov 30, 2023Updated 2 years ago
- Notes from learning RISC-V☆12Mar 13, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Oct 18, 2024Updated last year
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆45Oct 19, 2022Updated 3 years ago
- A simple implementation of the 20Q game with an ANN, built as a major project for COMP9417 @ UNSW☆19Sep 23, 2017Updated 8 years ago
- ☆13Apr 1, 2025Updated last year
- The CTF questions about smart contracts☆11Sep 1, 2018Updated 7 years ago
- Run test on demand with support for many test runners☆10Aug 13, 2024Updated last year
- The Python Opportunistic Network Simulator. Run DTN simulations using SimPy.☆11Jul 25, 2025Updated 8 months ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- misc scripts☆21Apr 7, 2026Updated last week
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Feb 21, 2026Updated last month
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 3 months ago
- Automatic Software-based Protection and Integrity Suite☆20Apr 9, 2026Updated last week
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Apr 3, 2026Updated 2 weeks ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆23Nov 1, 2025Updated 5 months ago
- Repository for the current status of the LESS submission☆13Mar 16, 2026Updated last month
- ☆16Apr 6, 2023Updated 3 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last month
- go library for ChipWhisperer hardware security platform☆21Aug 1, 2019Updated 6 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- A portable, easy to use, readable and flexible SSL library (dual-licensed, with FOSS exceptions)☆24Aug 6, 2025Updated 8 months ago