Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (MICRO 2021)
☆11Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for UC-Check
Users that are interested in UC-Check are comparing it to the libraries listed below
Sorting:
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Microarchitectural control flow integrity (𝜇CFI) verification checks whether there exists a control or data flow from instruction's ope…☆16Feb 12, 2026Updated 2 weeks ago
- x86 JIT playground for documenting and exploring microarchitectural implementation details☆19Oct 15, 2025Updated 4 months ago
- ☆20Nov 27, 2023Updated 2 years ago
- 3D-FPIM: An Extreme Energy-Efficient DNN Acceleration System Using 3D NAND Flash-Based In-Situ PIM Unit (MICRO 2022)☆18May 19, 2023Updated 2 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated last month
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆25Aug 9, 2023Updated 2 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆41Nov 13, 2021Updated 4 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Aug 17, 2018Updated 7 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated 2 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Feb 23, 2026Updated last week
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- Check the risk score of an IP Address 🔎☆11May 16, 2024Updated last year
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆43Oct 19, 2022Updated 3 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- The CRT X-Y library (libcrtxy) is meant to be used by video game programmers who wish to create games in the style of vector graphics a…☆13Sep 2, 2023Updated 2 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- A tutorial for setting up Symbolic Quick Error Detection (SQED) using the model checker, CoSA, on the Ride Core☆12May 24, 2019Updated 6 years ago
- C recursive descent parser based on Ian Piumarta's peg(1)☆20Feb 4, 2014Updated 12 years ago
- Hard Real-Time world-wide clock synchronization utilizing new better algorithms than PTP and NTP uses.☆14Jan 4, 2016Updated 10 years ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago