Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Jul 9, 2021 - C++
{{ message }}
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Python Time Based Authentication Attack Tool
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
SQL blind data extraction POC
Analyse timing leakage against ECU over the CAN bus network.
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
Testing the Rust crypto library orion with sidefuzz
Testing the Rust crypto library orion with dudect-bencher
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Secure account recovery demonstration with timing attack protection and email signing and encryption
ECE458 Assignments
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."