There are no reviews yet. Be the first to send feedback to the community and the maintainers!
meltdown
This repository contains several applications, demonstrating the Meltdown bug.ZombieLoad
Proof-of-concept for the ZombieLoad attackrowhammerjs
Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScriptCJAG
CJAG is an open-source implementation of our cache-based jamming agreement.armageddon
This repository contains tools to perform modern cache attacks on ARM.KAISER
Kernel Address Isolation to have Side-channels Efficiently Removedsgxrop
The code to the SGX-ROP papertransientfail
Website and PoC collection for transient execution attacksdrama
This repository contains examples of DRAMA reverse-engineering and side-channel attacksChromeZero
Google Chrome extension implementing JavaScript Zeroflush_flush
This repository contains examples of Flush+Flush cache attackscache_template_attacks
This repository contains several tools to perform Cache Template Attacksmerkle-tree
A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).sweb
SWEB Educational OSAEPIC
ios-analysis
Automated Binary Analysis on iOSPicnic
Optimized implementation of the Picnic signature schemeprefetch
This repository contains several tools to perform Prefetch Side-Channel Attacksjstemplate
JavaScript Template Attack proof-of-concept implementationhybrid-HE-framework
secure-block-device
The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.flipfloyd
Tools for "Another Flip in the Wall"interruptjs
Practical Keystroke Timing Attacks in Sandboxed JavaScriptmsrevelio
memsec
Framework for building transparent memory encryption and authentication solutionspairings_in_c
C library for bilinear pairingskeydrown
Eliminating Keystroke Timing AttacksChestnut
CollidePower
gzkbpp
Implementation of the ZKB++ proof systemflecc_in_c
FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN CProcHarvester
ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Androidcoco-alma
CocoAlma is an execution-aware tool for formal verification of masked implementationsDonky
drawio2tikz
drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz codefish-begol
Implementation of the Fish and Begol signature schemesmarvellous-attacks
Attacks on Jarvis and FridayJenny
halfdouble
SCAnDroid
Memory-Compression-Attacks
Memory Compression Attacksdata-gui
DATA GUIsgxjail
wolfSSL-DoS
Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.ios-analysis-llvmslicer
LayeredBinaryTemplating
Layered Binary TemplatingCoronaHeatMap
CryptoSlice
Static Analysis of Cryptography in Android Applicationscoco-ibex
CacheSim
CSIRowhammer
CSI:Rowhammer - Cryptographic Security and Integrity against RowhammerFLARE
CrySIL
CryptoTL
LVI-NULLify
contextlight
The PoC for ConTExT-lightrebecca
REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.libdropit
Proof-of-concept implementation of DropItdaps-dl
Short DAPS from ECDSA in OpenSSLTBIBS
Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLSromulush_collisions
rainier-signatures
bnpp_helium_signatures
minefield
trusted-location-based-services
Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.ios-analysis-dagger
Picnic-FPGA
FPGA implementation of Picnic and LowMCspearv
servas
sgxjail-sdk
Implementation of SGXJail in the Linux SGX SDKbanquet-signature-variants
mimc-analysis
mimc-analysisMPC-Accumulator
Love Open Source and this site? Check out how you can help us