HongyuHe / shell
A Unix shell written in C.
☆8Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for shell
- Two old-school games with fancy features and GUI.☆8Updated 3 years ago
- Sample code for the Breakfast Search Club.☆6Updated 4 years ago
- 🖥️ An instruction set architecture (a subset of the JVM assembly language) used in the Java platform.☆9Updated 3 years ago
- A memory allocator written in C.☆6Updated 3 years ago
- ☆15Updated 3 weeks ago
- Frontend: React + Vite + TS; Backend: Python Flask☆20Updated last week
- Shielded Enclaves for Cloud FPGAs☆15Updated 2 years ago
- Cycle Accurate Symbolic Timing Analysis of Network Functions☆10Updated 2 years ago
- ☆9Updated 2 years ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆16Updated last year
- ☆21Updated last year
- A Fast Graph Update Library for FPGA-based Dynamic Graph Processing☆8Updated 2 years ago
- ☆18Updated last year
- Documentation☆38Updated 4 months ago
- Recent papers related to hardware formal verification.☆59Updated last year
- ☆15Updated 9 months ago
- The #SAT solver sharpSAT☆55Updated 2 years ago
- ☆14Updated 7 years ago
- ☆22Updated 3 years ago
- ☆16Updated 3 years ago
- ☆9Updated 3 years ago
- Victima is a new software-transparent technique that greatly extends the address translation reach of modern processors by leveraging the…☆26Updated last year
- MIRAGE (USENIX Security 2021)☆11Updated last year
- ☆12Updated 2 years ago
- P4 formalization using Ott and HOL4☆9Updated last week
- GPU-enabled Hardware Fuzzer using Genetic Algorithm☆14Updated last year
- TRAGEN: A Synthetic Trace Generator for Realistic Cache Simulations☆20Updated 7 months ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆37Updated 4 years ago
- Characterizing and Modeling Non-Volatile Memory Systems [MICRO'20, TopPicks'21]☆33Updated 2 years ago