trailofbits / sixtyfourLinks
How fast can we brute force a 64-bit comparison?
☆54Updated 6 years ago
Alternatives and similar repositories for sixtyfour
Users that are interested in sixtyfour are comparing it to the libraries listed below
Sorting:
- A differential fuzzer for x86 decoders☆260Updated this week
- Docs and resources on CPU Speculative Execution bugs☆375Updated 8 years ago
- Lower Size Bounds for Sorting Networks☆46Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- poststructural fuzzing☆31Updated 6 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- estimate peak virtual memory use☆18Updated 10 months ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- LLVM syntax highlight extension for VS Code☆14Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆137Updated 4 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 5 years ago
- Spectre POC: Reading from another process☆36Updated 6 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆78Updated 8 years ago
- Corpus of crypto formats☆12Updated 3 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- Automatic inference of a formal specification of the x86_64 instruction set☆71Updated 9 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- The Bear Operating System☆24Updated 8 years ago
- An experimental file formats playground☆88Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆90Updated 4 years ago
- ☆78Updated 4 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆123Updated 4 years ago
- A tiny KVM hypervisor written in Python☆69Updated 7 years ago
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- ☆118Updated 2 years ago