toddmaustin / kevlarLinks
KEVLAR memory defenses.
☆17Updated 7 months ago
Alternatives and similar repositories for kevlar
Users that are interested in kevlar are comparing it to the libraries listed below
Sorting:
- The public release of LeftoverLocals code☆70Updated last year
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated last month
- Proof-of-concept for the GhostWrite CPU bug.☆114Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- ☆33Updated 8 months ago
- Microarchitectural exploitation and other hardware attacks.☆96Updated last year
- ☆33Updated 8 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆52Updated 4 months ago
- Side-channel traces visualizer☆16Updated 5 months ago
- ☆16Updated 2 years ago
- Spectre based on Linear Address Masking☆68Updated last year
- ☆60Updated 7 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Updated 8 months ago
- ☆22Updated 3 months ago
- ☆24Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆12Updated 3 years ago
- ☆16Updated 4 years ago
- examples of using radius2 to solve reversing challenges☆35Updated 9 months ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆30Updated last week
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- Unicorn: Symbolic Execution, Bounded Model Checking, and Code Optimization of RISC-V Code using Classical Solvers and Quantum Computers☆36Updated last week
- Toolkit for creating cryptographic figures and videos.☆34Updated last year
- Ascon - Lightweight Authenticated Encryption & Hashing☆246Updated last month
- ☆75Updated last year
- Student Starter Code for Secure Hardware Design at MIT☆80Updated last year
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- embedded-systems-security-examples☆25Updated 3 years ago
- Fork of LLVM for demonstrating optimization pass development☆30Updated 2 years ago