Skip to content
@isec-tugraz

Institute of Information Security

Popular repositories Loading

  1. meltdown meltdown Public archive

    This repository contains several applications, demonstrating the Meltdown bug.

    C 4.1k 523

  2. ZombieLoad ZombieLoad Public

    Proof-of-concept for the ZombieLoad attack

    C 812 122

  3. rowhammerjs rowhammerjs Public

    Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript

    C++ 508 76

  4. armageddon armageddon Public archive

    This repository contains tools to perform modern cache attacks on ARM.

    C 288 78

  5. CJAG CJAG Public

    CJAG is an open-source implementation of our cache-based jamming agreement.

    C 282 37

  6. KAISER KAISER Public

    Kernel Address Isolation to have Side-channels Efficiently Removed

    216 43

Repositories

Showing 10 of 87 repositories
  • C 2 MIT 0 0 0 Updated Mar 10, 2025
  • AutoDiVer Public

    Automatic Verification of Differential Characteristics

    Python 3 MIT 0 0 0 Updated Mar 6, 2025
  • sweb Public

    SWEB Educational OS

    C++ 120 112 7 3 Updated Feb 13, 2025
  • SnailLoad Public

    SnailLoad Demo Webserver

    C 34 MIT 4 0 0 Updated Feb 5, 2025
  • KernelSnitch Public
    C 11 MIT 1 1 0 Updated Nov 30, 2024
  • C 40 MIT 17 5 0 Updated Nov 27, 2024
  • six-worlds-anemoi Public

    Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi

    Jupyter Notebook 0 MIT 0 0 0 Updated Nov 22, 2024
  • ca-tip5family-monolith Public

    Opening the Blackbox: Collision attacks on round-reduced Tip5, Tip4, Tip4’ and Monolith.

    Jupyter Notebook 5 MIT 0 0 0 Updated Nov 22, 2024
  • C++ 0 0 0 0 Updated Nov 12, 2024
  • coco-alma Public

    CocoAlma is an execution-aware tool for formal verification of masked implementations

    Python 21 Apache-2.0 12 2 2 Updated Sep 26, 2024

Top languages

Loading…

Most used topics

Loading…