zhangxin00 / thermalscopeLinks
Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts" (DAC'24)
☆12Updated 6 months ago
Alternatives and similar repositories for thermalscope
Users that are interested in thermalscope are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Updated 6 months ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆26Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- ☆12Updated 3 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Updated 5 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆17Updated last week
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated last year
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 3 years ago
- Artifact for paper: Breaking and Fixing Speculative Load Hardening☆11Updated last year
- Proof-of-Concept of the Frontal Attack☆10Updated 2 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- XML representation of the x86 instruction set☆28Updated last month
- ☆16Updated 2 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆13Updated last year
- ☆39Updated 3 weeks ago
- ☆16Updated 2 years ago
- ☆30Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- Tests for verifying compliance of RMM implementations☆18Updated this week
- ☆20Updated 3 years ago
- HW interface for memory caches☆28Updated 5 years ago
- ☆50Updated 3 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- ☆10Updated last year
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 2 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆22Updated 4 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆54Updated 3 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆12Updated 5 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago