andreas-abel / XED-to-XML
XML representation of the x86 instruction set
☆28Updated 2 years ago
Alternatives and similar repositories for XED-to-XML:
Users that are interested in XED-to-XML are comparing it to the libraries listed below
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆32Updated 4 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆25Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆69Updated 8 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆52Updated 2 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 8 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- print information from LLVM dataflow analyses☆13Updated 5 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- reverse engineering branch predictors☆17Updated 9 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Updated 4 years ago
- QEMU with support for CHERI☆58Updated last week
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 5 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains☆22Updated last year
- Automatic detection of speculative information flows☆67Updated 3 years ago
- ☆35Updated 7 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆40Updated 4 years ago
- Performance Counter Measurements at the cycle granularity☆18Updated 3 years ago
- HW interface for memory caches☆26Updated 4 years ago
- llvm opt fuzzer and bounded exhaustive test generator☆39Updated 2 years ago
- Verification of BPF JIT compilers☆54Updated last year
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated last year
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- ☆50Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- Example implementation of Arm's Architecture Specification Language (ASL)☆41Updated this week
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago