Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Apr 23, 2025 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒Unified API for password hashing algorithms
👥 A Python post-quantum cryptography library
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Python Time Based Authentication Attack Tool
A repository of tools for verifying constant-timeness
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Collection of TLS vulnerabilities ready to be exploited.
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
SQL blind data extraction POC
Demo of API key cracking using a timing attack
simulation of a timing covert channel , where a sender transmits a binary message to a receiver without directly sending data.
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
Analyse timing leakage against ECU over the CAN bus network.
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Repo contains codes implemented for different side channel attacks and faults for CS579 (physical attacks and countermeasures) for my Master's at Oregon State University
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."