☆20Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for FetchBench
Users that are interested in FetchBench are comparing it to the libraries listed below
Sorting:
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 7 months ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- ☆17Nov 14, 2022Updated 3 years ago
- Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (…☆11Dec 27, 2021Updated 4 years ago
- Rust library for parsing a number of firmware images☆14Feb 22, 2023Updated 3 years ago
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆39Jul 29, 2022Updated 3 years ago
- x86 virtualization study notes using Intel VT-x☆22Jan 3, 2014Updated 12 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆38Sep 6, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆23May 23, 2020Updated 5 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- Java client library for integration with Freja eID☆12Feb 10, 2026Updated 2 weeks ago
- hardware & software prefetcher☆30Dec 21, 2023Updated 2 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Feb 20, 2026Updated last week
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- M1 bare metal project in Rust☆31Sep 1, 2022Updated 3 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- ☆35Feb 3, 2025Updated last year
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- VS Code based debugger for hardware designs in Amaranth or Verilog☆39Dec 3, 2024Updated last year
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆80Nov 10, 2025Updated 3 months ago
- An eBPF-powered Active Defense system that turns your Linux server into a deceptive honeypot. Features transparent traffic redirection, O…☆65Jan 5, 2026Updated last month
- Patch your macOS kernel to enable support for the high-resolution timers on M1☆38May 8, 2025Updated 9 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Nov 25, 2024Updated last year
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆39Aug 15, 2023Updated 2 years ago
- Minimal CPU Emulator Powered by the ARM PL080 DMA Controller☆36Jul 25, 2024Updated last year
- Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s …☆90Jan 30, 2026Updated last month
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- ☆12Feb 3, 2026Updated 3 weeks ago
- Python library for Alphanov's PDM laser sources control☆13Updated this week
- ☆12Feb 8, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago