vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆213Updated 4 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- ☆183Updated 4 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- Differential Address Trace Analysis☆57Updated last year
- This repository contains the tools we used in our research on the Google Titan M chip☆188Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated this week
- Intel Management Engine firmware loader plugin for IDA☆92Updated 7 years ago
- ☆149Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Tools for timing attacks☆18Updated 9 years ago
- IPC scripts for access to Intel CRBUS☆119Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆141Updated 3 years ago
- Linux i386 tool to load and execute ME modules.☆133Updated 4 years ago
- TRRespass☆124Updated 4 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆164Updated 5 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆87Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆42Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 2 months ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆73Updated 3 months ago
- ☆76Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago