☆17Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for swivel
Users that are interested in swivel are comparing it to the libraries listed below
Sorting:
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆11Jun 10, 2024Updated last year
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- ☆23Jun 14, 2023Updated 2 years ago
- Userspace eBPF Runtime Benchmarking Test Suite and Results☆16Apr 21, 2024Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Synced with SGX101 gitbook.☆31Dec 7, 2023Updated 2 years ago
- ☆15Dec 15, 2022Updated 3 years ago
- Paging Debug tool for GDB using python☆13Jun 4, 2022Updated 3 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- ☆58May 10, 2024Updated last year
- ☆18Sep 1, 2018Updated 7 years ago
- [MICRO'20] LENS: A Low-level NVRAM Profiler [USENIX Security'23] NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems☆14Jul 8, 2024Updated last year
- Towards a million-node RISC-V cluster.☆14Mar 6, 2025Updated 11 months ago
- Wrapper shells enabling designs generated by rocket-chip to map onto certain FPGA boards☆20Nov 27, 2024Updated last year
- Website and PoC collection for transient execution attacks☆202Mar 9, 2024Updated last year
- ☆72Oct 6, 2023Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- wasm bindings for huggingface tokenizers library☆34Jun 30, 2022Updated 3 years ago
- Course website for Advanced Operating Systems☆13Apr 8, 2022Updated 3 years ago
- outline and links for PLDI 2022 tutorial☆17Jun 13, 2022Updated 3 years ago
- Source code of KVM☆18Aug 14, 2022Updated 3 years ago
- Source code of QEMU☆17Apr 15, 2021Updated 4 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆23Aug 22, 2022Updated 3 years ago
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant secur…☆66Updated this week
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- ☆20Sep 8, 2025Updated 5 months ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- ☆28Jan 7, 2026Updated last month
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆49Apr 15, 2018Updated 7 years ago
- ☆25Dec 5, 2024Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago