• Stars
    star
    1
  • Language
    C++
  • License
    Other
  • Created almost 5 years ago
  • Updated almost 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Implementation of SGXJail in the Linux SGX SDK

More Repositories

1

meltdown

This repository contains several applications, demonstrating the Meltdown bug.
C
4,092
star
2

ZombieLoad

Proof-of-concept for the ZombieLoad attack
C
812
star
3

rowhammerjs

Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
C++
488
star
4

CJAG

CJAG is an open-source implementation of our cache-based jamming agreement.
C
281
star
5

armageddon

This repository contains tools to perform modern cache attacks on ARM.
C
279
star
6

KAISER

Kernel Address Isolation to have Side-channels Efficiently Removed
214
star
7

sgxrop

The code to the SGX-ROP paper
C
183
star
8

transientfail

Website and PoC collection for transient execution attacks
C
160
star
9

drama

This repository contains examples of DRAMA reverse-engineering and side-channel attacks
C++
157
star
10

ChromeZero

Google Chrome extension implementing JavaScript Zero
JavaScript
147
star
11

flush_flush

This repository contains examples of Flush+Flush cache attacks
C
147
star
12

cache_template_attacks

This repository contains several tools to perform Cache Template Attacks
C
131
star
13

merkle-tree

A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).
C
126
star
14

sweb

SWEB Educational OS
C++
113
star
15

AEPIC

C
110
star
16

ios-analysis

Automated Binary Analysis on iOS
Shell
103
star
17

Picnic

Optimized implementation of the Picnic signature scheme
C
77
star
18

prefetch

This repository contains several tools to perform Prefetch Side-Channel Attacks
C
56
star
19

jstemplate

JavaScript Template Attack proof-of-concept implementation
HTML
53
star
20

hybrid-HE-framework

C
36
star
21

secure-block-device

The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.
C
34
star
22

flipfloyd

Tools for "Another Flip in the Wall"
C
33
star
23

interruptjs

Practical Keystroke Timing Attacks in Sandboxed JavaScript
HTML
31
star
24

msrevelio

C++
29
star
25

memsec

Framework for building transparent memory encryption and authentication solutions
VHDL
25
star
26

pairings_in_c

C library for bilinear pairings
C
24
star
27

keydrown

Eliminating Keystroke Timing Attacks
C
21
star
28

Chestnut

C
20
star
29

CollidePower

C
20
star
30

gzkbpp

Implementation of the ZKB++ proof system
C++
17
star
31

ascon_hardware

Hardware implementations of the authenticated encryption design ASCON
VHDL
17
star
32

flecc_in_c

FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C
Scilab
17
star
33

ProcHarvester

ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Java
17
star
34

coco-alma

CocoAlma is an execution-aware tool for formal verification of masked implementations
Python
16
star
35

Donky

C
14
star
36

drawio2tikz

drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz code
Python
14
star
37

fish-begol

Implementation of the Fish and Begol signature schemes
C
13
star
38

marvellous-attacks

Attacks on Jarvis and Friday
Python
10
star
39

Jenny

C
10
star
40

halfdouble

C++
10
star
41

SCAnDroid

Java
9
star
42

Memory-Compression-Attacks

Memory Compression Attacks
C
9
star
43

data-gui

DATA GUI
Python
9
star
44

sgxjail

Makefile
8
star
45

wolfSSL-DoS

Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.
C
8
star
46

ios-analysis-llvmslicer

C++
7
star
47

LayeredBinaryTemplating

Layered Binary Templating
Python
7
star
48

CoronaHeatMap

C++
6
star
49

CryptoSlice

Static Analysis of Cryptography in Android Applications
Java
6
star
50

coco-ibex

SystemVerilog
5
star
51

CacheSim

C++
5
star
52

CSIRowhammer

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
C
5
star
53

FLARE

C
5
star
54

CrySIL

JavaScript
4
star
55

CryptoTL

C++
4
star
56

LVI-NULLify

C
4
star
57

contextlight

The PoC for ConTExT-light
C
4
star
58

rebecca

REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.
Verilog
4
star
59

libdropit

Proof-of-concept implementation of DropIt
C
3
star
60

daps-dl

Short DAPS from ECDSA in OpenSSL
C
3
star
61

TBIBS

Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLS
Java
3
star
62

romulush_collisions

TeX
3
star
63

rainier-signatures

C++
2
star
64

bnpp_helium_signatures

C++
2
star
65

minefield

C++
2
star
66

trusted-location-based-services

Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.
Java
2
star
67

ios-analysis-dagger

C++
2
star
68

Picnic-FPGA

FPGA implementation of Picnic and LowMC
VHDL
2
star
69

spearv

C
2
star
70

servas

1
star
71

banquet-signature-variants

C++
1
star
72

mimc-analysis

mimc-analysis
C++
1
star
73

MPC-Accumulator

Java
1
star