Here are
29 public repositories
matching this topic...
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🔒 Unified API for password hashing algorithms
Updated
Apr 28, 2021
JavaScript
👥 A Python post-quantum cryptography library
Updated
Sep 9, 2016
Python
timing attack to check if devtools are open
Updated
May 6, 2016
JavaScript
Timing Attack on TLS' ECDSA signature
Python Time Based Authentication Attack Tool
Updated
Apr 20, 2021
Python
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Updated
Aug 29, 2021
Python
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Updated
Nov 21, 2020
Python
SMArTCAT Symbolically Modeled Architecture Timing Channel Analysis Tool
SQL blind data extraction POC
Updated
Jul 29, 2021
Python
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
ndnSIM v2.5 based Voice over NDN-like brute-force side channel timing attack scenario (supplementary code work for the revision IEEE Access).
Analyse timing leakage against ECU over the CAN bus network.
A repository of tools for verifying constant-timeness
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
Updated
Dec 31, 2019
Jupyter Notebook
Updated
Jan 25, 2022
Python
⌛ Timing attack safe string comparison
Updated
Mar 25, 2022
TypeScript
Testing the Rust crypto library orion with sidefuzz
Updated
Mar 28, 2021
Rust
Testing the Rust crypto library orion with dudect-bencher
Updated
Aug 21, 2021
Rust
PoC: strcmp timing attack
Updated
Nov 1, 2018
Python
Demo of API key cracking using a timing attack
Updated
Nov 14, 2021
JavaScript
Secure account recovery demonstration with timing attack protection and email signing and encryption
Updated
May 14, 2018
Java
A super simple script demonstrating linearity in password length and time required for cracking using a timing attack.
Updated
Jan 21, 2022
Python
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
Updated
May 11, 2022
Jupyter Notebook
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Undergraduate Research Project
Improve this page
Add a description, image, and links to the
timing-attacks
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
timing-attacks
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.