Stars
6
Forks
4
Language
C
Last Updated
May 09, 2021
Similar Repos
Repo | Language | Stars | Description | Updated At |
---|---|---|---|---|
C | 64 | Simple constant-time AES implementation | Aug 11, 2022 | |
C | 6 | ChipArmourer helps you build secure firmware resistant against fault injection attacks. | Jun 02, 2021 | |
Go | 6 | Mirror of my constant time Go AES implementation. | Jan 19, 2022 | |
C | 7 | Implementation of secure CAN network in "Power Analysis and Fault Attacks against Secure CAN: How … | Jun 29, 2022 | |
Python | 8 | differential fault analysis attacks (DFA) against SM4 | Feb 24, 2023 | |
JavaScript | 49 | Constant-time comparison algorithm to prevent timing attacks | Jul 23, 2022 | |
Standard ML | 65 | Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against … | May 25, 2023 | |
C | 6 | Secure implementation of ECDSA against side-channel analysis and fault analysis attacks. The protocol is implemented … | Dec 06, 2022 | |
OCaml | 48 | Constant time equal function to avoid timing attacks in OCaml | Nov 17, 2022 | |
Java | 2 | Secure AES Encryiption decorated Android SharedPreferences implementation. | Nov 03, 2015 | |
Python | 3 | Real-time White-Box attacks against Object Detection. | Jul 05, 2022 | |
Scala | 3 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | May 06, 2023 | |
Shell | 53 | Tips to mitigate and secure your large-scale server against DDoS attacks. | Aug 22, 2022 | |
Python | 2 | Implementation and exploration of the paper Tesseract: Gradient Flip Score to Secure Federated Learning against … | May 12, 2022 | |
Python | 13 | Defending Against Backdoor Attacks Using Robust Covariance Estimation | Jun 28, 2022 | |
Go | 3 | Match an IP address against a lot of prefixes in constant time | Dec 08, 2022 | |
HTML | 4 | Tool created to secure linux servers against DDoS attacks in a simple way. | Apr 15, 2022 | |
Shell | 8 | Tool created to secure linux servers against DDoS attacks in a simple way. | Jul 01, 2022 | |
C | 2 | An implementation in C of SIMECK lightweight block ciphers and the simulation of Differential Fault … | Apr 15, 2023 | |
Jupyter Notebook | 18 | Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection" | May 11, 2023 | |
Rust | 10 | A Rust implementation of a constant time LFU cache | Jul 31, 2022 | |
Rust | 15 | An implementation of the DudeCT constant-time function tester | Mar 27, 2023 | |
Python | 2 | TensorFlow implementation of Liquid Time-Constant Neural Network layers | May 13, 2023 | |
C | 10 | A cryptographically secure lockless PRNG device driver using AES | Jun 11, 2022 | |
Java | 78 | A tiny Java agent that blocks attacks against unsafe deserialization | Feb 22, 2023 | |
Python | 5 | A proxy for pip that protects against name confusion attacks | Sep 08, 2021 | |
Python | 4 | CW-Lint running against ARM Implementation of AES with various builds possible. | Sep 14, 2021 | |
Go | 19 | SM cipher library. Constant-time implementation of SM2 and SM4. | Oct 19, 2022 | |
PHP | 2 | Create CSRF tokens secure from compression attacks like CRIME/BREACH/TIME/HEIST | Dec 08, 2022 | |
Jupyter Notebook | 12 | Capsule networks can defend against adversarial attacks using reconstruction error | Jan 28, 2023 | |
C | 3 | Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. | May 23, 2022 | |
C | 3 | Tracing page fault statistics (e.g., avg. page fault time) using ftrace in Linux | Sep 04, 2022 | |
OCaml | 15 | Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks. | Apr 19, 2023 | |
Swift | 2139 | 🔒 Swift Obfuscator that protects iOS apps against reverse engineering attacks. | Apr 25, 2023 | |
Swift | 2 | 🔒Swift Obfuscator that protects iOS apps against reverse engineering attacks. | Jul 28, 2021 | |
JavaScript | 13 | JavaScript AES and CBC implementation using ArrayBuffer | Mar 17, 2022 | |
PHP | 14 | Protects your WordPress website against brute force login attacks using .htaccess | Jun 15, 2022 | |
Jupyter Notebook | 2 | A Keras implementation of the paper "Robust Graph Convolutional Networks Against Adversarial Attacks" | Oct 29, 2020 | |
Python | 3 | Simple Greedy algorithm AREST, which can find you the best state encoding for a given … | May 17, 2023 | |
C++ | 481 | A C++ compile-time math library using generalized constant expressions | Apr 28, 2023 | |
C++ | 27 | Compiler-based tool that protects Intel SGX applications against controlled-channel attacks | Jan 03, 2023 | |
Python | 2 | Python File Encryption program that encrypt and decrypt your files using AES encryption algorithms. Completely-Secure-Files | Dec 26, 2021 | |
Jupyter Notebook | 2 | Spatial Transformer Networks implementation using fastai+pytorch | Mar 19, 2024 | |
TypeScript | 4 | A secure key/value storage using AES encryption for values using localStorage for Deno. | Apr 04, 2023 | |
Python | 25 | Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al. | Sep 07, 2022 | |
HTML | 10 | VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: … | Mar 20, 2022 | |
JavaScript | 1310 | A BVH implementation to speed up raycasting and enable spatial queries against three.js meshes. | Aug 12, 2022 | |
None | 2 | A BVH implementation to speed up raycasting and enable spatial queries against three.js meshes. | Nov 15, 2021 | |
Python | 211 | 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks | Oct 18, 2022 | |
C# | 3 | .NET Core C# implementation of a padding oracle attack against AES CBC (PKCS7, ANSI X.923) | Mar 07, 2023 |