Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.
☆11Aug 8, 2019Updated 6 years ago
Alternatives and similar repositories for Microarchitectural-attacks
Users that are interested in Microarchitectural-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MIRAGE (USENIX Security 2021)☆14Nov 8, 2023Updated 2 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Sep 1, 2018Updated 7 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆38Jun 10, 2020Updated 5 years ago
- SpecLLM: Exploring Generation and Review of VLSI Design Specification with Large Language Model☆16Jan 29, 2024Updated 2 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Oct 8, 2018Updated 7 years ago
- A bunch of sample codes related to kernel fuzzing☆12Feb 7, 2019Updated 7 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Basic experimentation with Windows drivers.☆17Mar 3, 2023Updated 3 years ago
- Tools for "Another Flip in the Wall"☆40Jun 12, 2018Updated 7 years ago
- small and independent checkpoint☆12Nov 4, 2023Updated 2 years ago
- Docker configuration to build linux chromium☆16Jun 8, 2022Updated 3 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆15Mar 23, 2022Updated 4 years ago
- CPU Internals (Cache, TLB, MMU, Pipeline, Branch Prediction, Out-of-Order Execution, ROB, Side Channel Attack ...)☆25Aug 21, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- wide.HK 1602 OLED Library☆18Jul 10, 2018Updated 7 years ago
- Implementations of Graph Neural Network models in pytorch geometric☆18Jul 22, 2020Updated 5 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆33Feb 12, 2026Updated last month
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated 2 years ago
- ☆198Jun 12, 2024Updated last year
- Repository contenente il sorgente LaTex per il pdf riguardante Fondamenti matematici per l'informatica.☆11Mar 3, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Self-balancing and line-following bot simulation☆34Oct 17, 2023Updated 2 years ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- [TACO 2024] A hardware prefetching framework employing Tyche, a hardware prefetcher designed for indirect memory access patterns.☆25Apr 15, 2024Updated last year
- ☆20Aug 3, 2018Updated 7 years ago
- Scraper to get data from crunchbase.com and read - write the data using SQLite database and JSON file.☆16Apr 27, 2019Updated 6 years ago
- Implementations of basic concepts dealt under the Reinforcement Learning umbrella. This project is collection of assignments in CS747: F…☆17May 21, 2018Updated 7 years ago