Institute of Applied Information Processing and Communications (IAIK) (@IAIK)
  • Stars
    star
    8,267
  • Global Org. Rank 2,788 (Top 0.9 %)
  • Registered over 11 years ago
  • Most used languages
    C
    43.1 %
    C++
    23.6 %
    Java
    8.3 %
    Python
    6.9 %
    VHDL
    4.2 %
    HTML
    2.8 %
    JavaScript
    2.8 %
    TeX
    1.4 %
    SystemVerilog
    1.4 %
    Scilab
    1.4 %
    Shell
    1.4 %
    Verilog
    1.4 %
    Makefile
    1.4 %
  • Location ๐Ÿ‡ฆ๐Ÿ‡น Austria
  • Country Total Rank 16
  • Country Ranking
    C
    1
    Scilab
    1
    VHDL
    1
    SystemVerilog
    5
    C++
    12
    Verilog
    13
    Makefile
    19
    Shell
    31
    HTML
    46
    TeX
    66
    Java
    161
    Python
    220

Top repositories

1

meltdown

This repository contains several applications, demonstrating the Meltdown bug.
C
4,092
star
2

ZombieLoad

Proof-of-concept for the ZombieLoad attack
C
812
star
3

rowhammerjs

Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
C++
488
star
4

CJAG

CJAG is an open-source implementation of our cache-based jamming agreement.
C
281
star
5

armageddon

This repository contains tools to perform modern cache attacks on ARM.
C
279
star
6

KAISER

Kernel Address Isolation to have Side-channels Efficiently Removed
214
star
7

sgxrop

The code to the SGX-ROP paper
C
183
star
8

transientfail

Website and PoC collection for transient execution attacks
C
160
star
9

drama

This repository contains examples of DRAMA reverse-engineering and side-channel attacks
C++
157
star
10

ChromeZero

Google Chrome extension implementing JavaScript Zero
JavaScript
147
star
11

flush_flush

This repository contains examples of Flush+Flush cache attacks
C
147
star
12

cache_template_attacks

This repository contains several tools to perform Cache Template Attacks
C
131
star
13

merkle-tree

A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).
C
126
star
14

sweb

SWEB Educational OS
C++
113
star
15

AEPIC

C
111
star
16

ios-analysis

Automated Binary Analysis on iOS
Shell
103
star
17

Picnic

Optimized implementation of the Picnic signature scheme
C
77
star
18

prefetch

This repository contains several tools to perform Prefetch Side-Channel Attacks
C
56
star
19

jstemplate

JavaScript Template Attack proof-of-concept implementation
HTML
53
star
20

hybrid-HE-framework

C
36
star
21

secure-block-device

The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.
C
34
star
22

flipfloyd

Tools for "Another Flip in the Wall"
C
33
star
23

interruptjs

Practical Keystroke Timing Attacks in Sandboxed JavaScript
HTML
31
star
24

msrevelio

C++
29
star
25

memsec

Framework for building transparent memory encryption and authentication solutions
VHDL
25
star
26

pairings_in_c

C library for bilinear pairings
C
24
star
27

keydrown

Eliminating Keystroke Timing Attacks
C
21
star
28

CollidePower

C
20
star
29

Chestnut

C
19
star
30

gzkbpp

Implementation of the ZKB++ proof system
C++
17
star
31

ascon_hardware

Hardware implementations of the authenticated encryption design ASCON
VHDL
17
star
32

flecc_in_c

FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C
Scilab
17
star
33

ProcHarvester

ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Java
17
star
34

coco-alma

CocoAlma is an execution-aware tool for formal verification of masked implementations
Python
16
star
35

Donky

C
14
star
36

drawio2tikz

drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz code
Python
14
star
37

fish-begol

Implementation of the Fish and Begol signature schemes
C
13
star
38

marvellous-attacks

Attacks on Jarvis and Friday
Python
10
star
39

Jenny

C
10
star
40

halfdouble

C++
10
star
41

SCAnDroid

Java
9
star
42

Memory-Compression-Attacks

Memory Compression Attacks
C
9
star
43

data-gui

DATA GUI
Python
9
star
44

sgxjail

Makefile
8
star
45

wolfSSL-DoS

Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.
C
8
star
46

ios-analysis-llvmslicer

C++
7
star
47

LayeredBinaryTemplating

Layered Binary Templating
Python
7
star
48

CoronaHeatMap

C++
6
star
49

CryptoSlice

Static Analysis of Cryptography in Android Applications
Java
6
star
50

coco-ibex

SystemVerilog
5
star
51

CacheSim

C++
5
star
52

CSIRowhammer

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
C
5
star
53

FLARE

C
5
star
54

CrySIL

JavaScript
4
star
55

CryptoTL

C++
4
star
56

LVI-NULLify

C
4
star
57

contextlight

The PoC for ConTExT-light
C
4
star
58

rebecca

REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.
Verilog
4
star
59

libdropit

Proof-of-concept implementation of DropIt
C
3
star
60

daps-dl

Short DAPS from ECDSA in OpenSSL
C
3
star
61

TBIBS

Time-bound identity-based signatures (TBIBฮฃ) for Short-Lived Forward-Secure Delegation in TLS
Java
3
star
62

romulush_collisions

TeX
3
star
63

rainier-signatures

C++
2
star
64

bnpp_helium_signatures

C++
2
star
65

minefield

C++
2
star
66

trusted-location-based-services

Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.
Java
2
star
67

ios-analysis-dagger

C++
2
star
68

Picnic-FPGA

FPGA implementation of Picnic and LowMC
VHDL
2
star
69

spearv

C
2
star
70

servas

1
star
71

sgxjail-sdk

Implementation of SGXJail in the Linux SGX SDK
C++
1
star
72

banquet-signature-variants

C++
1
star
73

mimc-analysis

mimc-analysis
C++
1
star
74

MPC-Accumulator

Java
1
star