There are no reviews yet. Be the first to send feedback to the community and the maintainers!
meltdown
This repository contains several applications, demonstrating the Meltdown bug.ZombieLoad
Proof-of-concept for the ZombieLoad attackrowhammerjs
Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScriptarmageddon
This repository contains tools to perform modern cache attacks on ARM.CJAG
CJAG is an open-source implementation of our cache-based jamming agreement.KAISER
Kernel Address Isolation to have Side-channels Efficiently Removedsgxrop
The code to the SGX-ROP paperdrama
This repository contains examples of DRAMA reverse-engineering and side-channel attackstransientfail
Website and PoC collection for transient execution attacksflush_flush
This repository contains examples of Flush+Flush cache attacksChromeZero
Google Chrome extension implementing JavaScript Zerocache_template_attacks
This repository contains several tools to perform Cache Template Attacksmerkle-tree
A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).sweb
SWEB Educational OSAEPIC
ios-analysis
Automated Binary Analysis on iOSPicnic
Optimized implementation of the Picnic signature schemeprefetch
This repository contains several tools to perform Prefetch Side-Channel AttacksSLUBStick
jstemplate
JavaScript Template Attack proof-of-concept implementationhybrid-HE-framework
msrevelio
flipfloyd
Tools for "Another Flip in the Wall"secure-block-device
The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.SnailLoad
interruptjs
Practical Keystroke Timing Attacks in Sandboxed JavaScriptmemsec
Framework for building transparent memory encryption and authentication solutionsCollidePower
keydrown
Eliminating Keystroke Timing Attacksgzkbpp
Implementation of the ZKB++ proof systemChestnut
coco-alma
CocoAlma is an execution-aware tool for formal verification of masked implementationsascon_hardware
Hardware implementations of the authenticated encryption design ASCONflecc_in_c
FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN CProcHarvester
ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Androiddrawio2tikz
drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz codeDonky
fish-begol
Implementation of the Fish and Begol signature schemeshalfdouble
marvellous-attacks
Attacks on Jarvis and FridayJenny
SCAnDroid
Memory-Compression-Attacks
Memory Compression Attacksdata-gui
DATA GUIsgxjail
ios-analysis-llvmslicer
LayeredBinaryTemplating
Layered Binary TemplatingCoronaHeatMap
CryptoSlice
Static Analysis of Cryptography in Android ApplicationswolfSSL-DoS
Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.FLARE
coco-ibex
CryptoTL
CacheSim
CSIRowhammer
CSI:Rowhammer - Cryptographic Security and Integrity against RowhammerCrySIL
LVI-NULLify
contextlight
The PoC for ConTExT-lightrebecca
REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.libdropit
Proof-of-concept implementation of DropItdaps-dl
Short DAPS from ECDSA in OpenSSLTBIBS
Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLSromulush_collisions
Picnic-FPGA
FPGA implementation of Picnic and LowMCspearv
rainier-signatures
bnpp_helium_signatures
minefield
trusted-location-based-services
Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.Remote-Memory-Deduplication-Attacks
Remote Page Deduplication Attacksios-analysis-dagger
servas
sgxjail-sdk
Implementation of SGXJail in the Linux SGX SDKbanquet-signature-variants
mimc-analysis
mimc-analysisMPC-Accumulator
DefectsInDepth
Love Open Source and this site? Check out how you can help us