Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
翻译 - 野外使用的公共恶意软件技术:虚拟机,仿真,调试器,沙盒检测。
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Timing Attack on TLS' ECDSA signature
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Collection of TLS vulnerabilities ready to be exploited.
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using ...
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
Demo of API key cracking using a timing attack
simulation of a timing covert channel , where a sender transmits a binary message to a receiver without directly sending data.
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Analyse timing leakage against ECU over the CAN bus network.