axbryd / warp-artifacts
Artifacts for ATC '22 paper "Faster Software Packet Processing on FPGA NICs with eBPF Program Warping"
☆17Updated 2 years ago
Alternatives and similar repositories for warp-artifacts:
Users that are interested in warp-artifacts are comparing it to the libraries listed below
- ☆59Updated 4 years ago
- ☆33Updated 4 years ago
- High-performance eBPF implementation in hardware.☆27Updated 3 years ago
- An infrastructure for inline acceleration of network applications☆30Updated 3 years ago
- ☆14Updated last year
- ☆15Updated last year
- ☆45Updated 2 years ago
- FlowBlaze: Stateful Packet Processing in Hardware☆68Updated 2 years ago
- An Agile Chisel-Based SoC Design Framework☆26Updated 3 years ago
- An FPGA-based NetTLP adapter☆25Updated 5 years ago
- A Programmable Hardware Architecture for Network Transport Logic☆34Updated 3 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆27Updated 4 years ago
- ☆42Updated 9 months ago
- P4 compatible HLS modules☆11Updated 6 years ago
- ☆62Updated 2 months ago
- [AFK] Hardware router in Chisel (THU Network Joint Lab 2020)☆14Updated 4 years ago
- ☆31Updated 9 years ago
- Modifications to GEM5 for running kernel bypass networking. (DPDK)☆15Updated last year
- The Domino compiler to run packet programs on pipelined switches☆29Updated 3 years ago
- Artifacts for the "BBQ: A Fast and Scalable Integer Priority Queue for Hardware Packet Scheduling" paper that appears in NSDI '24.☆17Updated 11 months ago
- IRN's packet processing logic synthesized using Xilinx Vivado HLS☆23Updated 6 years ago
- Skyloft: A General High-Efficient Scheduling Framework in User Space (SOSP 2024)☆33Updated 7 months ago
- ☆20Updated 2 years ago
- RPCNIC: A High-Performance and Reconfigurable PCIe-attached RPC Accelerator [HPCA2025]☆10Updated 4 months ago
- Implementation of Stateless and Stateful Cheetah with TCP timestamps for the Tofino P4 target☆20Updated 3 years ago
- ☆15Updated 6 years ago
- Reducing P4 Language’s Voluminosity using Higher-Level Constructs☆15Updated 2 years ago
- ☆51Updated 9 months ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆39Updated 4 years ago
- ☆14Updated 7 years ago