Stars
Quickly build and run kernels inside a virtualized snapshot of your live system
Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs
Revizor's artifact evaluation submission
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels" (USENIX Security'23)
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]
This is an experimental version of page coloring in Linux
Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser
Defines a common protocol for language servers.
Intel Management Engine JTAG Proof of Concept
Intel, AMD, VIA & Freescale CPU Microcode Repositories
DRAMsim3: a Cycle-accurate, Thermal-Capable DRAM Simulator
Some notes on a cli terminal, upcycling an old super 8 film viewer
Userspace tool to map virtual page addresses to physical addresses.
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
Microarchitectural exploitation and other hardware attacks.