From 2f80f1ecadbaffdce836774cb492f524ae4019fa Mon Sep 17 00:00:00 2001 From: Billy Brumley Date: Tue, 29 Jan 2019 15:21:44 +0200 Subject: [PATCH] screenshot: updated with peaks --- .gitignore | 1 + README.md | 4 ++-- parse_raw_simple.png | 4 ++-- parse_raw_simple.py | 1 + 4 files changed, 6 insertions(+), 4 deletions(-) diff --git a/.gitignore b/.gitignore index 3729ea3..368bbf2 100644 --- a/.gitignore +++ b/.gitignore @@ -1,5 +1,6 @@ *.bin *.pem +*.sig ecc spy pipe.fifo diff --git a/README.md b/README.md index fa3f2f5..c7390b7 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,10 @@ # Summary -This is a proof-of-concept exploit of the PortSmash microarchitecture attack, tracked by CVE-2018-5407. +This is a proof-of-concept exploit of the PortSmash microarchitecture attack, tracked by [CVE-2018-5407](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407). More technical details about the PortSmash side-channel are available in [this manuscript](https://eprint.iacr.org/2018/1060). -![Alt text](parse_raw_simple.png?raw=true "Title") +![Alt text](parse_raw_simple.png?raw=true "sample PortSmash visualization tooling") # Setup diff --git a/parse_raw_simple.png b/parse_raw_simple.png index ecaf88c..01b5cd0 100644 --- a/parse_raw_simple.png +++ b/parse_raw_simple.png @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:0a709615374beef49aa57a67d7b0df1b5ef9daf667f2d015d256d54d1e183b97 -size 81993 +oid sha256:bdc0f66dd99520ff6227b75e76e01f67ad2a377feb70b40b962ef9e9f219ef2a +size 323309 diff --git a/parse_raw_simple.py b/parse_raw_simple.py index 8f67619..90d06fa 100644 --- a/parse_raw_simple.py +++ b/parse_raw_simple.py @@ -1,4 +1,5 @@ #!/usr/bin/env python +# -*- coding: utf-8 -*- import sys import array