{"payload":{"pageCount":2,"repositories":[{"type":"Public","name":"IRQGuard","owner":"cispa","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,6,4],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-06T19:00:53.031Z"}},{"type":"Public","name":"cascading-spy-sheets","owner":"cispa","isFork":false,"description":"This repository contains the artifact for our paper \"Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting\" published at NDSS 2025.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,4,0,0,1,0,0,0,0,3,4,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-06T14:55:06.435Z"}},{"type":"Public","name":"CacheWarp","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"CacheWarp: Software-based Fault Injection using Selective State Reset\" (USENIX Security 2024)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":53,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,1,9,2,1,0,2,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-12T20:34:57.498Z"}},{"type":"Public","name":"GhostWrite","owner":"cispa","isFork":false,"description":"Proof-of-concept for the GhostWrite CPU bug.","allTopics":["cpu","microarchitectural-attack"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":99,"forksCount":16,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-09T06:32:31.588Z"}},{"type":"Public","name":"Security-RISC","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs\" (IEEE S&P 2023)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":51,"forksCount":5,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-01T08:37:25.525Z"}},{"type":"Public","name":"CVA6-Vivado-Project-with-Xilinx-AXI-Ethernet","owner":"cispa","isFork":false,"description":"Vivado 2023.2 project built around the CVA6 RISC-V CPU and a software stack including u-boot and embedded linux.","allTopics":[],"primaryLanguage":{"name":"Tcl","color":"#e4cc98"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-29T06:54:31.953Z"}},{"type":"Public","name":"cva6-sdk","owner":"cispa","isFork":true,"description":"CVA6 SDK containing RISC-V tools and Buildroot","allTopics":[],"primaryLanguage":{"name":"Makefile","color":"#427819"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":64,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-26T13:05:31.824Z"}},{"type":"Public","name":"cva6","owner":"cispa","isFork":true,"description":"The CORE-V CVA6 is an Application class 6-stage RISC-V CPU capable of booting Linux","allTopics":[],"primaryLanguage":{"name":"Assembly","color":"#6E4C13"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":671,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-26T13:04:10.979Z"}},{"type":"Public","name":"analogdevices-hdl-lib","owner":"cispa","isFork":true,"description":"HDL libraries and projects","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1503,"license":"Other","participation":[3,4,6,9,1,5,9,5,3,7,6,3,4,4,1,0,1,3,7,11,4,2,2,3,1,3,2,6,4,5,9,10,10,23,8,8,1,4,3,2,3,5,7,6,8,3,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-26T09:48:42.197Z"}},{"type":"Public","name":"trust-me-if-you-can","owner":"cispa","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,1,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-25T13:18:55.331Z"}},{"type":"Public","name":"login-security-landscape","owner":"cispa","isFork":false,"description":"Code for our 2024 IEEE S&P Paper \"To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape\"","allTopics":[],"primaryLanguage":{"name":"TypeScript","color":"#3178c6"},"pullRequestCount":0,"issueCount":1,"starsCount":8,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-24T13:57:30.186Z"}},{"type":"Public","name":"loop-DoS","owner":"cispa","isFork":false,"description":"Repository for application-layer loop DoS","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":29,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-20T09:32:26.851Z"}},{"type":"Public","name":"http-conformance","owner":"cispa","isFork":false,"description":" Code for our 2024 ACM AsiaCCS Paper \"Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact\" ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-11T15:56:23.960Z"}},{"type":"Public","name":"Switchpoline","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8\" (AsiaCCS 2024)","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-14T13:29:33.260Z"}},{"type":"Public","name":"mwait","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels\" (USENIX Security'23)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":19,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-30T03:01:38.168Z"}},{"type":"Public","name":"Ethical-Server-Side-Scanning","owner":"cispa","isFork":false,"description":"Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research - Supplementary Material","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-21T21:44:11.632Z"}},{"type":"Public","name":"Verification-Disjunctive-Time-Networks","owner":"cispa","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-04T17:30:21.341Z"}},{"type":"Public","name":"regcheck","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"Reviving Meltdown 3a\" (ESORICS 2023)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T08:58:48.415Z"}},{"type":"Public","name":"indirect-meltdown","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks\" (ESORICS 2023)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":19,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-24T21:54:32.671Z"}},{"type":"Public","name":"Microarchitectural-Hash-Function-Recovery","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"Efficient and Generic Microarchitectural Hash-Function Recovery\" (IEEE S&P 2024)","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":25,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-30T15:43:00.748Z"}},{"type":"Public","name":"hammulator","owner":"cispa","isFork":false,"description":"Proof-of-concept implementation for the paper \"Hammulator: Simulate Now - Exploit Later\" (DRAMSec 2023)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":11,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-19T10:30:03.951Z"}},{"type":"Public","name":"internet-archive-study","owner":"cispa","isFork":false,"description":"This repository contains the crawling scripts used for the paper \"You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements\"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-25T20:30:47.486Z"}},{"type":"Public","name":"consent-notices","owner":"cispa","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-19T10:04:09.249Z"}},{"type":"Public","name":"12-angry-developers-web-applications","owner":"cispa","isFork":false,"description":"This repository contains our code for each version (programming language) for the Coding Task. It is a product of our work published at the 28th ACM Conference on Computer and Communications Security (CCS) in 2021.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-09T19:58:43.985Z"}},{"type":"Public","name":"DNS-Applayer-DDoS-Protection","owner":"cispa","isFork":false,"description":"Code and datasets for protecting DNS infrastructures against application-layer DDoS attacks (EuroS&P '23 paper)","allTopics":[],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-18T07:48:31.254Z"}},{"type":"Public","name":"xs-observations","owner":"cispa","isFork":false,"description":"Find leaky observation channels in browsers and XS-Leaks on websites","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-09T12:53:54.211Z"}},{"type":"Public","name":"micsec-training","owner":"cispa","isFork":false,"description":"The material for the hands-on session \"Turning Timing Differences into Data Leakage\" at Mic-Sec 2022 ","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-07T15:05:47.202Z"}},{"type":"Public","name":"gdpr-consent","owner":"cispa","isFork":false,"description":"Code for our paper: \"Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps\"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-20T08:29:42.435Z"}},{"type":"Public","name":"browser-cpu-fingerprinting","owner":"cispa","isFork":false,"description":"This repository contains the code for our paper \"Browser-based CPU Fingerprinting\".","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":35,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-19T12:18:00.186Z"}},{"type":"Public","name":"html-violations-analyzer","owner":"cispa","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-27T14:58:45.297Z"}}],"repositoryCount":44,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"cispa repositories"}