zaweke / rowhammerView external linksLinks
☆19Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for rowhammer
Users that are interested in rowhammer are comparing it to the libraries listed below
Sorting:
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Jun 19, 2025Updated 7 months ago
- ☆153Oct 18, 2018Updated 7 years ago
- SoftMC is an experimental FPGA-based memory controller design that can be used to develop tests for DDR3 SODIMMs using a C++ based API. T…☆143Aug 24, 2023Updated 2 years ago
- BTC :1JUhp2T15jPM9Y5r3uWmiyzMbAaRMNdoQg,LTC: LfDZfSaoyGtm8nEmfE4tsz8MtajPXfDAYd☆15Sep 16, 2017Updated 8 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Source code for testing the Row Hammer error mechanism in DRAM devices. Described in the ISCA 2014 paper by Kim et al. at http://users.ec…☆233Sep 2, 2015Updated 10 years ago
- The implementation of HawkEye, our research system: "HawkEye: Efficient Fine-grained OS Support for Huge Pages" from ASPLOS 2019.☆21Aug 5, 2021Updated 4 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Oct 9, 2020Updated 5 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆521Jun 15, 2025Updated 7 months ago
- ☆73Jan 16, 2026Updated 3 weeks ago
- This repository contains examples of Flush+Flush cache attacks☆169Oct 12, 2021Updated 4 years ago
- USIMM: the Utah SImulated Memory Module☆25Oct 22, 2014Updated 11 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Aug 23, 2017Updated 8 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 7 months ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- Native binary for testing Android phones for the Rowhammer bug☆488Jun 27, 2018Updated 7 years ago
- to study xilinx fpga using Zybo Z7-20 board☆14Mar 13, 2024Updated last year
- ☆34Dec 14, 2025Updated 2 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/hummingbird-hibl☆10Jun 3, 2018Updated 7 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- ☆11Apr 12, 2024Updated last year
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- ☆10Feb 11, 2020Updated 6 years ago
- evolution of extant software☆24Jan 24, 2018Updated 8 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- an experimental distribution based on musl libc and busybox☆11Jan 25, 2018Updated 8 years ago
- JoVA: Unified Multimodal Learning for Joint Video-Audio Generation☆30Dec 22, 2025Updated last month