Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Oct 6, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Python Time Based Authentication Attack Tool
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
A repository of tools for verifying constant-timeness
Collection of TLS vulnerabilities ready to be exploited.
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
Demo of API key cracking using a timing attack
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
SQL blind data extraction POC
simulation of a timing covert channel , where a sender transmits a binary message to a receiver without directly sending data.
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
Analyse timing leakage against ECU over the CAN bus network.
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."