bakhi / GPUReplayLinks
GPUReplay, ASPLOS 2022
☆36Updated 3 years ago
Alternatives and similar repositories for GPUReplay
Users that are interested in GPUReplay are comparing it to the libraries listed below
Sorting:
- ☆38Updated 6 months ago
- The Captive Hypervisor☆42Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆17Updated 11 months ago
- ARMv8 performance monitor from userspace☆78Updated 2 years ago
- HQEMU v2.5.1 is a retargetable and multi-threaded dynamic binary translator on multicores☆21Updated 7 years ago
- Header-only C library for reading/writing 64-bit Arm registers, automatically generated by parsing the AArch64 System Register XML.☆30Updated 4 years ago
- A collection of code based on LLVM/Clang compilation libraries and tools☆39Updated 5 years ago
- A collection of C/C++ programs and Python scripts to be used in conjunction with Intel Software Development Emulator (Intel SDE, availabl…☆45Updated 6 months ago
- A tool to sample a QEMU-KVM's memory access pattern at page level based on Intel VT-x☆21Updated 6 years ago
- ☆18Updated 2 years ago
- HW interface for memory caches☆28Updated 5 years ago
- A blog for LLVM(v9.0.0 or v11.0.0) beginner, step by step, with detailed documents and comments. Record the way I learn LLVM and accompli…☆103Updated 3 years ago
- ☆13Updated 4 years ago
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆16Updated last year
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆25Updated 2 years ago
- An LLVM pass to profile dynamic LLVM IR instructions and runtime values☆139Updated 4 years ago
- ☆15Updated 3 months ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆21Updated 2 years ago
- ☆16Updated 2 years ago
- ☆32Updated 2 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆14Updated 5 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 10 months ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆36Updated 2 years ago
- PARTS / LLVM compiler☆32Updated 5 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Updated 3 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆16Updated last week
- ☆16Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- A collection of reverse-engineered documentation for the instruction sets for various generations of Mali GPU's.☆38Updated 7 years ago