hardware-attacks-state-of-the-art icon indicating copy to clipboard operation
hardware-attacks-state-of-the-art copied to clipboard

Microarchitectural exploitation and other hardware attacks.

Hardware attacks / State of the art

Microarchitectural exploitation and other hardware attacks.

Contributing:

Contributions, comments and corrections are welcome, please do PR.

Flaws:

Proof of concepts:

  • TPM-Fail: https://github.com/VernamLab/TPM-Fail
  • Rowhammer (Google): https://github.com/google/rowhammer-test
  • Rowhammer (IAIK): https://github.com/IAIK/rowhammerjs
  • DRAMMER: https://github.com/vusec/drammer
  • SGX-Bomb: https://github.com/sslab-gatech/sgx-bomb
  • SWAPGS: https://github.com/bitdefender/swapgs-attack-poc
  • Berkeley Out-of-Order Machine (BOOM) RV64GC RISC-V core Spectre attacks: https://github.com/riscv-boom/boom-attacks
  • RETBleed: https://github.com/comsec-group/retbleed

Other PoCs:

Resources:

Tools:

  • sandsifter: The x86 processor fuzzer.
  • OpcodeTester: Analyse Undocumented Instructions on Intel x86/x86-64 and RISC-V.
  • evsets: Tool for testing and finding minimal eviction sets.
  • cachequery: A tool for interacting with hardware memory caches in modern Intel CPUs.
  • haruspex: Exploration of x86-64 ISA using speculative execution.
  • Blacksmith: Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns.
  • Speculator: Tool to Analyze Speculative Execution Attacks and Mitigations.
  • MicrocodeDecryptor: Understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies.
  • SiliFuzz: Fuzzing CPUs by proxy.
  • Cascade: CPU Fuzzing via Intricate Program Generation.

Slides:

Blogs and posts:

Other papers:

Others:

$ cat /sys/devices/system/cpu/vulnerabilities/*