Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".
☆16Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for plumber
Users that are interested in plumber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The open-source component of Prime+Scope, published at CCS 2021☆38Jul 18, 2023Updated 2 years ago
- Automated test generator to detectcache side channel leakages.☆11Jul 1, 2019Updated 6 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆64Aug 7, 2022Updated 3 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆14Jul 19, 2022Updated 3 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- Tutorial on how to use the AXI ACP on the UltraZed-EG IOCC☆11Jun 13, 2018Updated 7 years ago
- Binary analysis in HOL☆47Mar 9, 2026Updated last month
- Code repository for Coppelia tool☆24Nov 12, 2020Updated 5 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- ☆14Apr 1, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 6 months ago
- Notary: A Device for Secure Transaction Approval 📟☆28Feb 1, 2025Updated last year
- Recent papers related to hardware formal verification.☆77Sep 20, 2023Updated 2 years ago
- ☆16Mar 18, 2025Updated last year
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- ☆39Jul 16, 2024Updated last year
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆64Aug 12, 2024Updated last year
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HW interface for memory caches☆28Apr 21, 2020Updated 6 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- Crypto Side Channel Attack (CSCA)☆18Jul 18, 2018Updated 7 years ago
- Tools for experimenting with Running Average Power Limit (RAPL)☆18Jan 7, 2018Updated 8 years ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆42Nov 29, 2025Updated 5 months ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- Keccak Code Package☆14Oct 24, 2025Updated 6 months ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆23Jun 11, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatic detection of speculative information flows☆77Jul 14, 2021Updated 4 years ago
- ☆26Mar 11, 2026Updated last month
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆66Jun 4, 2025Updated 11 months ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆18Mar 29, 2021Updated 5 years ago
- ILAng documentation☆10Nov 2, 2025Updated 6 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago