Skip to content
This repository has been archived by the owner on Oct 1, 2022. It is now read-only.
/ armageddon Public archive

This repository contains tools to perform modern cache attacks on ARM.

Notifications You must be signed in to change notification settings

IAIK/armageddon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ARMageddon: Cache Attacks on Mobile Devices

This repository contains several libraries and tools to perform cache-attacks on the mobile devices. The published code has been used to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, Flush+Flush on non-rooted ARM-based devices without any privileges.

We have developed this libraries and tools in the ARMageddon: Cache Attacks on Mobile Devices paper and used it to build covert-channels that outperform state-of-the-art covert channels on Android by several orders of magnitude. We utilized it to implement cache template attacks that monitor tap and swipe events as well as keystrokes, and even derive the words entered on the touchscreen. Moreover, we used it to attack cryptographic primitives in Java and to monitor cache activity in the ARM TrustZone from the normal world.

The ARMageddon: Cache Attacks on Mobile Devices paper by Lipp, Gruss, Spreitzer, Maurice and Mangard has be published at the Usenix Security Symposium 2016 and presented at Black Hat Europe 2016.

Repository Content

Project Description
libflush Library to build cross-platform cache attacks
Cache Template Attacks Cross-platform implementation of Cache Template Attacks
Eviction Strategy Evaluator Find eviction strategy for your device
Input Simulator Simple tool to simulate touch events

References

About

This repository contains tools to perform modern cache attacks on ARM.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •