cgvwzq / polcaView external linksLinks
Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.
☆16Apr 21, 2020Updated 5 years ago
Alternatives and similar repositories for polca
Users that are interested in polca are comparing it to the libraries listed below
Sorting:
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 9 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 3 months ago
- A tool for checking tool output inspired by LLVM's FileCheck☆12Aug 29, 2025Updated 5 months ago
- A Tool for Intersecting Context-Free Grammars☆10Dec 19, 2017Updated 8 years ago
- Tool for testing and finding minimal eviction sets☆107May 6, 2021Updated 4 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated last year
- Instruction decoder microbenchmark suite☆11Oct 31, 2017Updated 8 years ago
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆18Apr 1, 2025Updated 10 months ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Jul 21, 2023Updated 2 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 5 years ago
- A compiler synthesizer for simple languages.☆15Dec 18, 2018Updated 7 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- A benchmark for C program verification☆17Feb 22, 2024Updated last year
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated 2 weeks ago
- RLU resizable hash-table☆17Aug 24, 2015Updated 10 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- [MICRO'20] LENS: A Low-level NVRAM Profiler [USENIX Security'23] NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems☆14Jul 8, 2024Updated last year
- XML representation of the x86 instruction set☆29Jan 17, 2026Updated 3 weeks ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Artifact repository for the "Practical Verification of System-Software Components Written in Standard C" paper (SOSP'24)☆24May 7, 2025Updated 9 months ago
- Reference material for libbeauty☆25Aug 6, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- MACTA: A Multi-agent Reinforcement Learning Approach for Cache Timing Attacks and Detection☆46Apr 25, 2023Updated 2 years ago
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- The space of memory management research and systems produced by the PLASMA lab (https://plasma-umass.org).☆20Mar 22, 2021Updated 4 years ago
- A survey on architectural simulators focused on CPU caches.☆16Feb 8, 2020Updated 6 years ago
- ☆20Sep 27, 2019Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- ☆27Nov 30, 2024Updated last year
- Benchmark for memory store throughput☆23Jun 22, 2021Updated 4 years ago
- Spatial layout specifications for memory management systems.☆19Sep 2, 2020Updated 5 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- Rag-bag of utilities and scripts that do strange things with ELF files☆18Nov 25, 2025Updated 2 months ago
- LLVM-jitted bitmaps☆27Apr 23, 2020Updated 5 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago