-
Notifications
You must be signed in to change notification settings - Fork 1
davidkaralli/flush-reload
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Covert channel using Flush+Reload side-channel attack. Programs should be compiled without any optimizations. (Makefile accounts for this.) To use: 1. Run the receiver before running the transmitter using the following command line input: ./receiver.exe transmitter.exe 2. Run the transmitter in a separate terminal using the following command line input: ./transmitter.exe <yourmessagehere> where <yourmessagehere> is the message you wish to transmit (no spaces). By default, the maximum character length is 256. This can be edited by changing the definition of "MAX_MSG_LENGTH" in receiver.c, but given the low bit transmission rate, I would not recommend sending a message this long. transmitter.exe will send 0xff as a start signal and will print "Start signal transmitted." after doing so. receiver.exe should print "Start signal received." at the same time. If this does not happen, you can kill transmitter.exe and run it again. (Killing receiver.exe is not necessary if it has not indicated that it has received the start signal.) At the end of the transmission, transmitter.exe will send 0x00 and terminate. receiver.exe will then print the received message both as characters and as a series of bytes, then terminate. Acknowledgments: Assembly code used in receiver.c found here: https://github.com/defuse/flush-reload-attacks Basic sending strategy (sender continuously does some action, receiver counts cache hits and misses) inspired by: https://github.com/moehajj/Flush-Reload
About
Flush-reload covert channel
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published