Secure-AI-Systems-Group / Mastik

Licence: GPL-3.0 license
GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/

Programming Languages

c
50402 projects - #5 most used programming language
C++
36643 projects - #6 most used programming language
M4
1887 projects
Makefile
30231 projects

Projects that are alternatives of or similar to Mastik

cpu-load-side-channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+66.67%)
Mutual labels:  side-channel-attacks
sicak
SIde-Channel Analysis toolKit: embedded security evaluation tools
Stars: ✭ 17 (-37.04%)
Mutual labels:  side-channel-attacks
hardware-attacks-state-of-the-art
Microarchitectural exploitation and other hardware attacks.
Stars: ✭ 29 (+7.41%)
Mutual labels:  side-channel-attacks
pyecsca
Python Elliptic Curve Side-Channel Analysis toolkit.
Stars: ✭ 23 (-14.81%)
Mutual labels:  side-channel-attacks
rainbow
Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator
Stars: ✭ 105 (+288.89%)
Mutual labels:  side-channel-attacks

Mastik: : A Micro-Architectural Side-Channel Toolkit

About

Micro-architectural side-channel attacks exploit contention on internal components of the processor to leak information between processes. While in theory such attacks are straightforward, practical implementations tend to be finicky and require significant understanding of poorly documented processor features and other domain-specific arcane knowledge. Consequently, there is a barrier to entry into work on micro-architectural side-channel attacks, which hinders the development of the area and the analysis of the resilience of existing software against such attacks.

This repository contains Mastik, a toolkit for experimenting with micro-architectural side-channel attacks. Mastik aims to provide implementations of published attack and analysis techniques. Currently, Mastik supports six side-channel attack techniques on the Intel x86-64 architecture:

  • Prime+Probe on the L1 data cache
  • Prime+Probe on the L1 instruction cache
  • Prime+Probe on the Last Level Cache
  • Flush+Reload
  • Flush+Flush
  • Performance-degradation attack

Usage

For example of usage look at the demo folder.

Additionally go to the Mastik homepage for documentation.

Links

The Mastik Home page can be found HERE.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].