Stars
This repository contains several applications, demonstrating the Meltdown bug.
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as g…
Implementation of Differentiable Digital Signal Processing (DDSP) in Pytorch
A practical attack framework for precise enclave execution control
Proof of concept code for the Spectre CPU exploit.
A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.
This repository contains examples of Flush+Flush cache attacks
This repository contains several tools to perform Cache Template Attacks
Header files for Intel TSX (Transactional Synchronization Extension) development
tools for setting and accessing advaned low-level CPU features
Very low-overhead timer/counter interfaces for C on Intel 64 processors.
[UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack
This repository contains several tools to perform Prefetch Side-Channel Attacks
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-chan…
GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/
Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks
Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
Library for Prime+Probe cache side-channel attacks on L1 and L2
Code to evaluate XLATE attacks as well existing cache attacks.
The open-source component of Prime+Scope, published at CCS 2021