vernamlab / medusaView external linksLinks
Medusa Repository: Transynther tool and Medusa Attack
☆19Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for medusa
Users that are interested in medusa are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆65Jun 4, 2025Updated 8 months ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- XML representation of the x86 instruction set☆29Jan 17, 2026Updated 3 weeks ago
- ☆45Jul 19, 2023Updated 2 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 6 years ago
- Website and PoC collection for transient execution attacks☆200Mar 9, 2024Updated last year
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆277Feb 6, 2026Updated last week
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- COATCheck☆13Nov 4, 2018Updated 7 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Oct 8, 2024Updated last year
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- ☆25Mar 1, 2023Updated 2 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 5 years ago
- The MIT Sanctum processor top-level project☆31Apr 7, 2020Updated 5 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated last year
- A script to check for common mistakes in LaTeX source files of scientific papers.☆34Aug 26, 2025Updated 5 months ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- ☆34Dec 14, 2025Updated 2 months ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- Simple network interface and statistics viewer☆12Oct 3, 2023Updated 2 years ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆19Sep 10, 2025Updated 5 months ago
- Mind mappings for Linux kernel/driver study and others using FreeMind utility☆14Nov 17, 2020Updated 5 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 10 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- RIDL test suite and exploits☆366Jun 9, 2020Updated 5 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- ☆102May 27, 2024Updated last year
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago