CMU-SAFARI / U-TRR
Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications", https://people.inf.ethz.ch/omutlu/pub/U-TRR-uncovering-RowHammer-protection-mechanisms_micro21.pdf
☆13Updated 2 years ago
Alternatives and similar repositories for U-TRR:
Users that are interested in U-TRR are comparing it to the libraries listed below
- DRAM Bender is the first open source DRAM testing infrastructure that can be used to easily and comprehensively test state-of-the-art HBM…☆64Updated 6 months ago
- ☆34Updated 4 years ago
- ☆12Updated 4 years ago
- CleanupSpec (MICRO-2019)☆17Updated 4 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆59Updated 4 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆22Updated 5 months ago
- This repository provides Pensieve, a security evaluation framework for microarchitectural defenses against speculative execution attacks.☆21Updated last year
- ☆19Updated 2 years ago
- ☆18Updated 2 years ago
- Proof of concept code for the BranchSpec exploit.☆9Updated 2 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆26Updated 2 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆60Updated 7 months ago