No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed
-
Updated
Mar 26, 2022 - JavaScript
No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed
Demo of API key cracking using a timing attack
An Apigee custom policy implemented in Java that introduces a delay in processing.
🔐 Isomorphic constant-time string and buffer comparison to prevent timing attacks.
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
Time Trial - A tool for performing feasibility analyses of timing attacks
Timing attack for pin
Browser-based bcrypt deep-dive — anatomy, cost factor benchmarking, timing-safe verification, and a real-world breach simulation. Part of the crypto-lab suite.
Implementation of timing and power analysis side-channel attacks on AES encryption with effective countermeasures and security analysis.
Browser-based timing side-channel attack demo — string comparison leakage, HMAC verification timing, RSA private key bit leakage, and cache-timing attacks with real performance.now() measurements and constant-time defenses. No backends. No simulated timing.
Browser-based lattice PQC implementation attack demo — NTT power analysis (ML-KEM CPA), rejection sampling fault bypass (ML-DSA key recovery), KyberSlash timing side-channel, faulty KECCAK seed injection. Mathematical security ≠ implementation security. No backends. Simulated attacks.
Browser-based MAC demo — HMAC, CMAC, Poly1305, and GHASH compared with live length extension attack, timing attack, and nonce reuse demonstrations. Real WebCrypto operations. No backends. No simulated math.
Detect timing attacks, cache timing, and branch prediction vulnerabilities
Constant-time ChaCha20-Poly1305 AEAD in C99 with a timing side-channel validator
Detect firmware rootkits by measuring time. CPU cycle-accurate timing attestation for x86 and ARM — no hardware required.
Browser-based educational simulation of the KyberSlash timing attacks on ML-KEM (Kyber) — secret-dependent division in poly_tomsg and poly_compress. Based on the CHES 2025 Best Paper. Vulnerable code, Barrett-reduction fix, and live attack simulation.
Add a description, image, and links to the timing-attack topic page so that developers can more easily learn about it.
To associate your repository with the timing-attack topic, visit your repo's landing page and select "manage topics."