Here are
24 public repositories
matching this topic...
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒 Unified API for password hashing algorithms
Updated
Apr 28, 2021
JavaScript
👥 A Python post-quantum cryptography library
Updated
Sep 9, 2016
Python
timing attack to check if devtools are open
Updated
May 6, 2016
JavaScript
Timing Attack on TLS' ECDSA signature
Updated
May 23, 2021
Rust
Python Time Based Authentication Attack Tool
Updated
Apr 20, 2021
Python
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Updated
Jun 21, 2020
Python
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Updated
Nov 21, 2020
Python
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
SQL blind data extraction POC
Updated
Jul 29, 2021
Python
ndnSIM v2.5 based Voice over NDN-like brute-force side channel timing attack scenario (supplementary code work for the revision IEEE Access).
Analyse timing leakage against ECU over the CAN bus network.
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
Updated
Dec 31, 2019
Jupyter Notebook
Testing the Rust crypto library orion with sidefuzz
Updated
Mar 28, 2021
Rust
Testing the Rust crypto library orion with dudect-bencher
Updated
Mar 28, 2021
Rust
PoC: strcmp timing attack
Updated
Nov 1, 2018
Python
⌛ Timing attack safe string comparison
Updated
Jun 29, 2021
JavaScript
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Secure account recovery demonstration with timing attack protection and email signing and encryption
Updated
May 14, 2018
Java
Undergraduate Research Project
Improve this page
Add a description, image, and links to the
timing-attacks
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
timing-attacks
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.