bakhi / GPUReplayLinks
GPUReplay, ASPLOS 2022
☆41Updated 3 years ago
Alternatives and similar repositories for GPUReplay
Users that are interested in GPUReplay are comparing it to the libraries listed below
Sorting:
- A blog for LLVM(v9.0.0 or v11.0.0) beginner, step by step, with detailed documents and comments. Record the way I learn LLVM and accompli…☆104Updated 3 years ago
- An LLVM pass to profile dynamic LLVM IR instructions and runtime values☆140Updated 4 years ago
- ☆33Updated 2 years ago
- ☆65Updated 4 months ago
- ☆35Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆13Updated 8 months ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆21Updated last week
- A tool to sample a QEMU-KVM's memory access pattern at page level based on Intel VT-x☆21Updated 6 years ago
- HW interface for memory caches☆28Updated 5 years ago
- HQEMU v2.5.1 is a retargetable and multi-threaded dynamic binary translator on multicores☆22Updated 7 years ago
- ☆19Updated 3 years ago
- A collection of reverse-engineered documentation for the instruction sets for various generations of Mali GPU's.☆37Updated 7 years ago
- Tests for verifying compliance of RMM implementations☆18Updated last week
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Updated 3 years ago
- 不炼金丹不坐禅, 不为商贾不耕田。 闲来写就青山卖, 不使人间造孽钱。☆37Updated 5 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆25Updated 2 years ago
- ☆34Updated 2 years ago
- Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆36Updated 2 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆24Updated last month
- LLFI is an LLVM based fault injection tool, that injects faults into the LLVM IR of the application source code. The faults can be injec…☆75Updated 3 years ago
- ☆18Updated 2 years ago
- ☆49Updated 3 years ago
- ☆23Updated 3 years ago
- ☆86Updated 2 years ago
- ☆23Updated 2 years ago
- ☆16Updated last month
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
- ARMv8 performance monitor from userspace☆78Updated 2 years ago