49 results for “topic:timing-attacks”
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
timing attack to check if devtools are open
Timing Attack on TLS' ECDSA signature
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Python Time Based Authentication Attack Tool
A repository of tools for verifying constant-timeness
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Collection of TLS vulnerabilities ready to be exploited.
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox
Demo of API key cracking using a timing attack
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
SQL blind data extraction POC
Detect side channels with statistically rigorous methods.
simulation of a timing covert channel , where a sender transmits a binary message to a receiver without directly sending data.
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
Analyse timing leakage against ECU over the CAN bus network.
Enumeration-resistant stable IDs
:hourglass: Timing attack safe string comparison
Simulation of a timing covert channel , where a sender transmits a binary message to a receiver and Implementation of Fiestel-based algorithm.
ndnSIM v2.5 based Voice over NDN-like brute-force side channel timing attack scenario (supplementary code work for the revision IEEE Access).
This is a proof of concept timing attack using genetic algorithm project for the course nature inspired computing offered at Innopolis University.
No description provided.
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
Timing attack for pin