Coder Social home page Coder Social logo

Hi~ Thank you for coming!

mydevgh's Projects

algorithm-structure icon algorithm-structure

2021年最新总结 500个常用数据结构,算法,算法导论,面试常用,大厂高级工程师整理总结

apue icon apue

《UNIX环境高级编程》随书代码与课后习题

aria2.conf icon aria2.conf

Aria2 配置文件 | OneDrive & Google Drvive 离线下载 | 百度网盘转存

cache-covert-channel-attack_-flush-reload- icon cache-covert-channel-attack_-flush-reload-

This project is a demonstration of Flush and Reload attack on real system.Creating a covert channel between Gogo and Gollu that are running on two separate physical cores. They cannot communicate directly for confidentiality reasons and that’s why they need to create a covert channel to communicate so that no other processes could get the information.

cache-model icon cache-model

A behavioural cache model for analysing the cache behaviour under side-channel attack.

cache-replacement-policies-in-gem5 icon cache-replacement-policies-in-gem5

This repository contains patches written in C++ and python for implementation of LIP, BIP, DIP and SRRIP cache replacement policies in gem5. It also contains implementation of Victim Caches. gem5 is an open source simulator for Computer Architecture research. These "diff" patches can be directly applied to gem5 2012 version.

cache-sca icon cache-sca

This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.

cache-side-channel-attack-on-gnupg icon cache-side-channel-attack-on-gnupg

In this task, I have performed the FLUSH+RELOAD attack on GnuPG cryptography Library to observe accesses to critical functions like Square (S), Module (r), and Multiply (M) function during the encryption or decryption process of the RSA algorithm. In this project, Gogo will mount a side-channel attack with a goal to leak the critical accesses of Gollu.

cacheaudit icon cacheaudit

A Tool for the Static Analysis of Cache Side Channels

caches icon caches

C++ cache with LRU/LFU/FIFO policies implementation

cachesc icon cachesc

Library for Prime+Probe cache side-channel attacks on L1 and L2

cape-implementation icon cape-implementation

The Cape security analyzer and enforcer for the CC 2022 paper "Cape: Compiler-Aided Program Transformation for HTM-Based Cache Side-Channel Defense"

cjag icon cjag

CJAG is an open-source implementation of our cache-based jamming agreement.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.