Pinned Repositories
armageddon
This repository contains tools to perform modern cache attacks on ARM.
CJAG
CJAG is an open-source implementation of our cache-based jamming agreement.
drama
This repository contains examples of DRAMA reverse-engineering and side-channel attacks
flush_flush
This repository contains examples of Flush+Flush cache attacks
KAISER
Kernel Address Isolation to have Side-channels Efficiently Removed
meltdown
This repository contains several applications, demonstrating the Meltdown bug.
rowhammerjs
Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
sgxrop
The code to the SGX-ROP paper
transientfail
Website and PoC collection for transient execution attacks
ZombieLoad
Proof-of-concept for the ZombieLoad attack
Institute of Applied Information Processing and Communications (IAIK)'s Repositories
IAIK/meltdown
This repository contains several applications, demonstrating the Meltdown bug.
IAIK/transientfail
Website and PoC collection for transient execution attacks
IAIK/cache_template_attacks
This repository contains several tools to perform Cache Template Attacks
IAIK/sweb
SWEB Educational OS
IAIK/AEPIC
IAIK/Picnic
Optimized implementation of the Picnic signature scheme
IAIK/SLUBStick
IAIK/hybrid-HE-framework
IAIK/msrevelio
IAIK/SnailLoad
IAIK/CollidePower
IAIK/Chestnut
IAIK/coco-alma
CocoAlma is an execution-aware tool for formal verification of masked implementations
IAIK/drawio2tikz
drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz code
IAIK/halfdouble
IAIK/data-gui
DATA GUI
IAIK/Memory-Compression-Attacks
Memory Compression Attacks
IAIK/CoronaHeatMap
IAIK/LayeredBinaryTemplating
Layered Binary Templating
IAIK/CacheSim
IAIK/coco-ibex
IAIK/CryptoTL
IAIK/CSIRowhammer
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
IAIK/romulush_collisions
IAIK/spearv
IAIK/TBIBS
Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLS
IAIK/bnpp_helium_signatures
IAIK/rainier-signatures
IAIK/Remote-Memory-Deduplication-Attacks
Remote Page Deduplication Attacks
IAIK/DefectsInDepth