There are no reviews yet. Be the first to send feedback to the community and the maintainers!
meltdown
This repository contains several applications, demonstrating the Meltdown bug.ZombieLoad
Proof-of-concept for the ZombieLoad attackrowhammerjs
Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScriptarmageddon
This repository contains tools to perform modern cache attacks on ARM.CJAG
CJAG is an open-source implementation of our cache-based jamming agreement.KAISER
Kernel Address Isolation to have Side-channels Efficiently Removedsgxrop
The code to the SGX-ROP paperdrama
This repository contains examples of DRAMA reverse-engineering and side-channel attackstransientfail
Website and PoC collection for transient execution attacksflush_flush
This repository contains examples of Flush+Flush cache attacksChromeZero
Google Chrome extension implementing JavaScript Zerocache_template_attacks
This repository contains several tools to perform Cache Template Attacksmerkle-tree
A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).sweb
SWEB Educational OSAEPIC
ios-analysis
Automated Binary Analysis on iOSPicnic
Optimized implementation of the Picnic signature schemeprefetch
This repository contains several tools to perform Prefetch Side-Channel AttacksSLUBStick
jstemplate
JavaScript Template Attack proof-of-concept implementationhybrid-HE-framework
msrevelio
flipfloyd
Tools for "Another Flip in the Wall"secure-block-device
The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.SnailLoad
interruptjs
Practical Keystroke Timing Attacks in Sandboxed JavaScriptpairings_in_c
C library for bilinear pairingsmemsec
Framework for building transparent memory encryption and authentication solutionsCollidePower
keydrown
Eliminating Keystroke Timing Attacksgzkbpp
Implementation of the ZKB++ proof systemChestnut
coco-alma
CocoAlma is an execution-aware tool for formal verification of masked implementationsascon_hardware
Hardware implementations of the authenticated encryption design ASCONflecc_in_c
FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN CProcHarvester
ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Androiddrawio2tikz
drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz codeDonky
fish-begol
Implementation of the Fish and Begol signature schemeshalfdouble
marvellous-attacks
Attacks on Jarvis and FridayJenny
SCAnDroid
Memory-Compression-Attacks
Memory Compression Attacksdata-gui
DATA GUIsgxjail
ios-analysis-llvmslicer
LayeredBinaryTemplating
Layered Binary TemplatingCoronaHeatMap
CryptoSlice
Static Analysis of Cryptography in Android ApplicationswolfSSL-DoS
Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.FLARE
coco-ibex
CryptoTL
CacheSim
CSIRowhammer
CSI:Rowhammer - Cryptographic Security and Integrity against RowhammerCrySIL
LVI-NULLify
contextlight
The PoC for ConTExT-lightrebecca
REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.libdropit
Proof-of-concept implementation of DropItdaps-dl
Short DAPS from ECDSA in OpenSSLTBIBS
Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLSromulush_collisions
spearv
rainier-signatures
bnpp_helium_signatures
minefield
trusted-location-based-services
Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.Remote-Memory-Deduplication-Attacks
Remote Page Deduplication Attacksios-analysis-dagger
servas
sgxjail-sdk
Implementation of SGXJail in the Linux SGX SDKbanquet-signature-variants
mimc-analysis
mimc-analysisMPC-Accumulator
DefectsInDepth
Love Open Source and this site? Check out how you can help us