Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (MICRO 2021)
☆10Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for UC-Check
Users that are interested in UC-Check are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 3D-FPIM: An Extreme Energy-Efficient DNN Acceleration System Using 3D NAND Flash-Based In-Situ PIM Unit (MICRO 2022)☆20May 19, 2023Updated 2 years ago
- x86 JIT playground for documenting and exploring microarchitectural implementation details☆20Oct 15, 2025Updated 5 months ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- Microarchitectural control flow integrity (𝜇CFI) verification checks whether there exists a control or data flow from instruction's ope…☆16Feb 12, 2026Updated last month
- ☆17Aug 25, 2022Updated 3 years ago
- ☆20Nov 27, 2023Updated 2 years ago
- NeuroSync: A Scalable and Accurate Brain Simulation System using Safe and Efficient Speculation (HPCA 2022)☆13Nov 9, 2022Updated 3 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- Open-source textbook about CHERI capabilities, for a developer audience☆18May 29, 2025Updated 9 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- A transfer function widget implemented using ImGui☆19May 7, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Mar 12, 2026Updated last week
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- 总结和比较目前发表的处理单细胞空间转录组学(Spatial Transcriptomic)的聚类方法。Conclusion and comparison of the current clustering method for ST data.☆11May 31, 2023Updated 2 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- ☆11Nov 27, 2024Updated last year
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Special purpose PowHSM firmware for the RSK PowPeg.☆17Updated this week
- This project builds the kernel, nsm driver and bootstrap process for AWS Nitro Enclaves.☆24Feb 24, 2025Updated last year
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Revizor - Hardware fuzzing for the age of speculation☆182Mar 4, 2026Updated 2 weeks ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- A D3 visualisations of web browsers commits☆24Updated this week
- Checkpoint 401 Forward Auth Security Server.☆17Jun 13, 2024Updated last year
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- 基于蒙特卡洛树搜索算法编写的黑白棋AI算法☆12Mar 28, 2022Updated 3 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- Championship Value Prediction (CVP) simulator.☆17Feb 17, 2021Updated 5 years ago
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- PIOS: Parallel Instructional Operating System - Instructional Template Code☆36Oct 21, 2012Updated 13 years ago
- nku计算机系统设计,用的nju ics2017的pa,未来不想做os的拿去water作业☆14Nov 6, 2022Updated 3 years ago