Skip to content

razaina/flush-reload-attack-cortex-a9

Repository files navigation

This project contains two part:

  • An android application that will load a shared library that is going to be attacked/targeted
  • A program that will "spy" the shared library for collecting memory reads/accesses timings

The android application/project can be compiled/imported within Android-studio and the APK can be directly installed on the device.

To compile the native code C/C++ you will need to download the android NDK (android-ndk-r10d/) and change the path to it within the makefile app/src/main/jni/Android.mk

The shared library that will be embedded within the application will be called libtarget.so. Source code is located in app/src/main/jni/target.cpp

The spy program is located in app/src/main/jni/spy.c.

The makefile is located at app/src/main/jni/Android.mk

While compiled, the spy program can be launched like this:

./spy path_to_shared_library output_file

path_to_shared_library == > Generally libraries are dropped at /data/app-lib/application.package.name/libs/*.so

output_file =====> results/timings will be stored in this file

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published