AutoCC

Covert channel analyzer

A tool that automatically discovers covert channels in hardware by analyzing machine states after context switches.

Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.

GitHub

14 stars
2 watching
6 forks
Language: Standard ML
last commit: 28 days ago
Linked from 1 awesome list

covert-channelformal-verificationfpvhardwaresecurity

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
ssteo/hitbsecconf2021ams-poc A proof-of-concept demonstrating a covert channel for command and control (C&C) and data exfiltration using AWS GuardDuty in a post-DNS era 2
jpcertcc/aa-tools A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data 455
trustedsec/trevorc2 A tool that enables covert command execution by masking communication through a legitimate website. 1,225
codingo/reconnoitre Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. 2,110
hiddenillusion/analyzepe Analyzes PE files by combining data from various tools to generate a centralized report. 204
bats3c/shad0w A post-exploitation toolset designed to operate covertly on heavily monitored environments. 2,045
peek/peek-dalli A tool to inspect and analyze Memcache commands made through Dalli during application requests 3
secrary/makin An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. 732
objective-see/donotdisturb Detects unauthorized physical access to laptops and alerts the user. 294
daybr4ak/c2reverseproxy A tool allowing covert communication between a compromised machine and a command and control server without exposing the machine to the network. 478
snaffcon/snaffler A tool designed to help pentesters and red teamers find potentially compromised files in large networks by leveraging Active Directory information. 2,133
tomchop/malcom Analyzes network traffic to detect malware communication and behavior 1,155
3coresec/automata Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. 50
veinsoftheearth/rivgraph A Python package for converting binary mask of channel networks into a directed graph with various metrics and analysis tools. 84
ledger-donjon/lascar A Python library designed to facilitate side-channel analysis by providing classes and functions to simplify the process. 376