Collected molecules will appear here. Add from search or explore.
Research artifact demonstrating side-channel timing attacks on cryptographic key decoding (parsing) within libraries like Botan and Microsoft CNG, showing that secret-dependent execution occurs during key loading even if the primitives themselves are constant-time.
Defensibility
citations
0
co_authors
4
This project is a static academic artifact linked to a 2021 research paper. It has zero stars and minimal forks, which is typical for a 'code accompanying paper' repository rather than a living open-source project. Its value is purely diagnostic and educational for security researchers and library maintainers. The defensibility is low because the 'product' is the discovery of a specific vulnerability; once the target libraries (Botan, CNG) are patched, the utility of the exploit code effectively drops to zero outside of regression testing. Frontier labs are unlikely to compete here as this is low-level systems security research far outside their core LLM/AI focus. The main 'competitors' are other security research firms like Trail of Bits or academic groups (e.g., those behind Minerva or CacheBleed). The displacement horizon is short because once these leakage patterns are integrated into automated scanners like 'oss-fuzz' or 'tis-interpreter', the manual exploit code becomes obsolete.
TECH STACK
INTEGRATION
reference_implementation
READINESS