Merge pull request #365 from meitar/trrespass

Add TRRespass fuzzer, a DRAM side-channel (rowhammer) fuzzer suite.
This commit is contained in:
Samar Dhwoj Acharya 2020-04-20 23:47:57 -05:00 committed by GitHub
commit bdb6e5cd8a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -710,6 +710,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing).
* [ChipWhisperer](http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks. * [ChipWhisperer](http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.
* [SGX-Step](https://github.com/jovanbulck/sgx-step) - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular. * [SGX-Step](https://github.com/jovanbulck/sgx-step) - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.
* [TRRespass](https://github.com/vusec/trrespass) - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.
## Social Engineering Tools ## Social Engineering Tools