Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked ARMageddon: Cache Attacks on Mobile Devices


dEEpEst

Recommended Posts

This repository contains several libraries and tools to perform cache-attacks on the mobile devices. The published code has been used to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, Flush+Flush on non-rooted ARM-based devices without any privileges.

 

We have developed this libraries and tools in the ARMageddon: Cache Attacks on Mobile Devices paper and used it to build covert-channels that outperform state-of-the-art covert channels on Android by several orders of magnitude. We utilized it to implement cache template attacks that monitor tap and swipe events as well as keystrokes, and even derive the words entered on the touchscreen. Moreover, we used it to attack cryptographic primitives in Java and to monitor cache activity in the ARM TrustZone from the normal world.

 

Download:

[HIDE-THANKS]

This is the hidden content, please
[/HIDE-THANKS]

 

Password:

level23hacktools.com

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.