defuse / flush-reload-attacks

182 stars 78 forks source link

Side-Channel Attacks on Everyday Applications

This repository contains the source code and experiment data accompanying Taylor Hornby's talk at Black Hat 2016 titled "Side-Channel Attacks on Everyday Applications."

Getting Started

For step-by-step instructions to perform an attack on your own system, see the Getting Started Guide.

Contributing

This most recent version of this code lives on GitHub. Pull requests are welcome, although I have very limited time to review and merge them. Please fork this project if I'm inhibiting your progress!

Acknowledgements

The code directly inside the flush-reload folder was provided by Yuval Yarom, one of the authors of FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. The code inside flush-reload/myversion is a complete re-write, based on the original code.

I would like to thank Prof. John Aycock at the University of Calgary for serving as my advisor when I was working on this project for my undergrad thesis. Our discussions helped carry the project to the results included here. He also contributed edits and improvements to an earlier version of the paper.

Contact

Taylor's contact information is available on his website.