trailofbits / sixtyfourLinks
How fast can we brute force a 64-bit comparison?
☆52Updated 5 years ago
Alternatives and similar repositories for sixtyfour
Users that are interested in sixtyfour are comparing it to the libraries listed below
Sorting:
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Trace a program using CPU tracer technology.☆27Updated 2 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 4 years ago
- Lower Size Bounds for Sorting Networks☆45Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- ARM is Turing-complete without data fetches☆18Updated 7 years ago
- estimate peak virtual memory use☆18Updated 2 months ago
- A tweakable block cipher☆31Updated last year
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- ☆78Updated 4 years ago
- Docs and resources on CPU Speculative Execution bugs☆374Updated 7 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- low-level Capstone system bindings for Rust☆13Updated 6 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- A small DFA for under 16 states☆51Updated 6 years ago
- An exploration of code homeomorphism☆33Updated 7 years ago
- An AES-based 384 bit permutation.☆20Updated 3 weeks ago
- rune - radare2 based symbolic emulator☆27Updated 7 years ago
- a friendly wrapper around ptrace☆132Updated 3 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆21Updated last year
- A DSL and compiler for generating peephole optimizers for Cranelift☆64Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆87Updated 3 years ago
- Underconstrained symbolic execution for cryptography verification☆18Updated 4 years ago
- Linux i386 tool to load and execute ME modules.☆133Updated 4 years ago
- Compiler/source code fuzzing tool using AFL instrumentation☆124Updated 6 years ago