Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Mar 18, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Python Time Based Authentication Attack Tool
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
SQL blind data extraction POC
Testing the Rust crypto library orion with dudect-bencher
A repository of tools for verifying constant-timeness
Testing the Rust crypto library orion with sidefuzz
Analyse timing leakage against ECU over the CAN bus network.
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
Demo of API key cracking using a timing attack
Secure account recovery demonstration with timing attack protection and email signing and encryption
Collection of TLS vulnerabilities ready to be exploited.
⌛ Timing attack safe string comparison
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."