0x5ec1ab / invalidate-compareLinks
☆17Updated 9 months ago
Alternatives and similar repositories for invalidate-compare
Users that are interested in invalidate-compare are comparing it to the libraries listed below
Sorting:
- ☆70Updated 6 months ago
 - ☆21Updated 3 years ago
 - ☆15Updated last year
 - Microscope: Enabling Microarchitectural Replay Attacks☆20Updated 5 years ago
 - The artifact for SecSMT paper -- Usenix Security 2022☆28Updated 3 years ago
 - Streamline Covert Channel Attack (presented in ASPLOS'21)☆20Updated 4 years ago
 - (elastic) cuckoo hashing☆14Updated 5 years ago
 - ☆34Updated 2 years ago
 - ☆20Updated 10 months ago
 - Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
 - ☆26Updated 7 months ago
 - ☆28Updated 2 years ago
 - Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Updated 5 years ago
 - Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
 - Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆50Updated 6 years ago
 - CleanupSpec (MICRO-2019)☆16Updated 5 years ago
 - ☆23Updated 3 years ago
 - ☆18Updated 3 years ago
 - ☆20Updated 3 years ago
 - New Cache implementation using Gem5☆13Updated 11 years ago
 - MIRAGE (USENIX Security 2021)☆13Updated last year
 - This repository provides Pensieve, a security evaluation framework for microarchitectural defenses against speculative execution attacks.☆24Updated last year
 - ☆35Updated 4 years ago
 - ☆115Updated 2 years ago
 - Victima is a new software-transparent technique that greatly extends the address translation reach of modern processors by leveraging the…☆30Updated 2 years ago
 - ☆12Updated last year
 - A Multiplatform benchmark designed to provide holistic, detailed and close-to-hardware view of memory system performance with family of b…☆41Updated 2 weeks ago
 - A behavioural cache model for analysing the cache behaviour under side-channel attack.☆27Updated 4 months ago
 - Library for Prime+Probe cache side-channel attacks on L1 and L2☆36Updated 5 years ago
 - ☆22Updated this week