Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Oct 6, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Python Time Based Authentication Attack Tool
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Testing the Rust crypto library orion with dudect-bencher
SQL blind data extraction POC
A repository of tools for verifying constant-timeness
Testing the Rust crypto library orion with sidefuzz
Analyse timing leakage against ECU over the CAN bus network.
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
Demo of API key cracking using a timing attack
⌛ Timing attack safe string comparison
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."