Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
☆30Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for Pythia
Users that are interested in Pythia are comparing it to the libraries listed below
Sorting:
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- ☆27Dec 20, 2021Updated 4 years ago
- An infrastructure for inline acceleration of network applications☆30Oct 25, 2021Updated 4 years ago
- IRN's packet processing logic synthesized using Xilinx Vivado HLS☆23Dec 14, 2018Updated 7 years ago
- ☆24Jul 21, 2022Updated 3 years ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆42Oct 19, 2020Updated 5 years ago
- [MICRO'20] LENS: A Low-level NVRAM Profiler [USENIX Security'23] NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems☆14Jul 8, 2024Updated last year
- ☆36Jan 21, 2021Updated 5 years ago
- Passive Disaggregated Persistent Memory at USENIX ATC 2020.☆51Nov 2, 2020Updated 5 years ago
- Simulator for comparing memory allocation policies for caches.☆19May 15, 2019Updated 6 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- A Fast, Scalable and Programmable Packet Scheduler in Hardware☆37Jul 2, 2019Updated 6 years ago
- Justitia provides RDMA isolation between applications with diverse requirements.☆43May 25, 2022Updated 3 years ago
- https://rs3lab.github.io/SynCord/☆26Nov 23, 2022Updated 3 years ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- The code for both the framework and experiments from the NSDI '19 paper "Loom: Flexible and Efficient NIC Packet Scheduling"☆31Feb 4, 2019Updated 7 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- (elastic) cuckoo hashing☆16Jun 20, 2020Updated 5 years ago
- A blog about my work in open-source and fast networking☆13Nov 16, 2024Updated last year
- Minimal RISC-V Chisel design strictly reflecting the ISA document for verification.☆18Feb 3, 2026Updated 3 weeks ago
- ☆11Mar 27, 2024Updated last year
- ☆48Dec 19, 2018Updated 7 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- libvirttime provides transparent time virtualization, all in userspace.☆15Nov 18, 2021Updated 4 years ago
- LITE Kernel RDMA Support for Datacenter Applications. SOSP 2017.☆111Jul 9, 2020Updated 5 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- Clio, ASPLOS'22.☆79Feb 8, 2022Updated 4 years ago
- TAS is a drop-in highly CPU efficient and scalable TCP acceleration service.☆91Jul 24, 2023Updated 2 years ago
- Optimizing data-intensive systems in disaggregated data centers☆13Jun 13, 2022Updated 3 years ago
- Thousand Island Scanner: Scaling Video Analysis on AWS Lambda☆13Oct 25, 2019Updated 6 years ago
- Shielded Enclaves for Cloud FPGAs☆15Nov 24, 2021Updated 4 years ago
- ☆33Oct 9, 2017Updated 8 years ago
- Framework of pa code for THU compiler principle course.☆13Dec 18, 2019Updated 6 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Dataset and Analysis for the FAST25 paper: "Cloudscape: A Study of Storage Services in Modern Cloud Architectures"☆16Feb 20, 2025Updated last year
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Arbitrary offloads for RDMA NICs☆99Apr 25, 2022Updated 3 years ago