A repository of tools for verifying constant-timeness
-
Updated
May 7, 2024 - Shell
A repository of tools for verifying constant-timeness
This is a demonstration of a simple timing attack used to extract private information
For side channel attack countermeasures. Currently script to prevent power analysis or timing analysis of password comparison.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Collection of TLS vulnerabilities ready to be exploited.
SQL blind data extraction POC
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Timing attack for pin
Enumeration-resistant stable IDs
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
⌛ Timing attack safe string comparison
This is a proof of concept timing attack using genetic algorithm project for the course nature inspired computing offered at Innopolis University.
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
Demo of API key cracking using a timing attack
Overview and POC? of how timing attacks work in a network environment as well as in the context of hardware security. 💻
timing-attack demo in python
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
A super simple script demonstrating linearity in password length and time required for cracking using a timing attack.
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."