trailofbits / sixtyfourLinks
How fast can we brute force a 64-bit comparison?
☆52Updated 5 years ago
Alternatives and similar repositories for sixtyfour
Users that are interested in sixtyfour are comparing it to the libraries listed below
Sorting:
- Lower Size Bounds for Sorting Networks☆46Updated 4 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Docs and resources on CPU Speculative Execution bugs☆377Updated 7 years ago
- A differential fuzzer for x86 decoders☆251Updated 10 months ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- poststructural fuzzing☆31Updated 5 years ago
- llvm opt fuzzer and bounded exhaustive test generator☆40Updated 2 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 5 years ago
- Corpus of crypto formats☆12Updated 2 years ago
- Differential fuzzing for elliptic curves☆23Updated 2 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆22Updated 2 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Spectre POC: Reading from another process☆36Updated 6 years ago
- A JIT compiler for Brainfuck running on x86_64 UEFI☆87Updated 7 years ago
- ☆78Updated 4 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆143Updated 4 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆121Updated 4 years ago
- estimate peak virtual memory use☆18Updated 5 months ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆71Updated 9 years ago
- A DSL and compiler for generating peephole optimizers for Cranelift☆64Updated 5 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 7 years ago
- An experimental file formats playground☆87Updated 2 years ago
- A bunch of scripts to scrape symbols from Linux distributions☆19Updated last week