Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".
☆16Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for plumber
Users that are interested in plumber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- Automated test generator to detectcache side channel leakages.☆11Jul 1, 2019Updated 6 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Code repository for Coppelia tool☆23Nov 12, 2020Updated 5 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- Notary: A Device for Secure Transaction Approval 📟☆28Feb 1, 2025Updated last year
- Recent papers related to hardware formal verification.☆77Sep 20, 2023Updated 2 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Aug 12, 2024Updated last year
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- Crypto Side Channel Attack (CSCA)☆18Jul 18, 2018Updated 7 years ago
- Tools for experimenting with Running Average Power Limit (RAPL)☆18Jan 7, 2018Updated 8 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Nov 22, 2019Updated 6 years ago
- Keccak Code Package☆13Oct 24, 2025Updated 5 months ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆66Jun 4, 2025Updated 9 months ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- ILAng documentation☆10Nov 2, 2025Updated 4 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- ☆48Dec 19, 2018Updated 7 years ago
- ☆11Jul 1, 2025Updated 8 months ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Revizor - Hardware fuzzing for the age of speculation☆182Mar 4, 2026Updated 3 weeks ago
- A tool for checking the contract satisfaction for hardware designs☆12Nov 4, 2025Updated 4 months ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 7 months ago
- codes for MMPM (TIP2018)☆12Mar 29, 2021Updated 4 years ago
- SecureBinder 是一款跨平台二进制文件捆绑与加壳工具,支持将两个 .exe / .elf / .apk 文件合并为一个自解压自执行的单文件。工具内置 RC4 加密、zlib 压缩、PyInstaller 打包、UPX 二次压缩与沙箱检测机制,适用于软件封装、双程序…☆12Jun 29, 2025Updated 8 months ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated last month
- Image Restoration using Plug-and-Play CNN MAP Denoisers☆13Dec 20, 2019Updated 6 years ago
- Shazam for food.☆15Dec 31, 2016Updated 9 years ago