Software based Side Channel attacks
-
Updated
Jul 19, 2020
Software based Side Channel attacks
Prototype code and helpers for the Zero-Knowledge Control-Flow Attestation (ZEKRA) protocol
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19
Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024
Windbg extension that allows you analyze Control Flow Guard map
Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019
Sample programs that illustrate how to use Control Flow Guard, VS2015's control flow integrity implementation
Security Evaluation of Dynamic Binary Instrumentation Engines
Sample programs that illustrate how to use control flow integrity with the clang compiler
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
Add a description, image, and links to the control-flow-integrity topic page so that developers can more easily learn about it.
To associate your repository with the control-flow-integrity topic, visit your repo's landing page and select "manage topics."