Data oblivious ISA prototyped on the RISC-V BOOM processor.
☆23Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for oisa
Users that are interested in oisa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Dec 14, 2025Updated 3 months ago
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 4 months ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- ☆14Dec 30, 2021Updated 4 years ago
- RISC-V Security HC admin repo☆18Jan 7, 2025Updated last year
- Group administration repository for Tech: IOPMP Task Group☆13Dec 19, 2024Updated last year
- ☆17Oct 9, 2023Updated 2 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last month
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- A project to demonstrate Xilinx MPSOC running Ubuntu☆20Feb 8, 2026Updated last month
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 6 months ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Dec 8, 2021Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 6 months ago
- ☆23Jul 3, 2024Updated last year
- ☆89Jan 20, 2023Updated 3 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Code for "Fast Sparse ConvNets" CVPR2020 submissions☆12Nov 20, 2019Updated 6 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- ☆35Mar 1, 2019Updated 7 years ago
- Minimal TensorFlow implementation of the Advantage Actor-Critic model for Atari games☆12Feb 15, 2018Updated 8 years ago
- ☆21Feb 6, 2020Updated 6 years ago
- ☆20Mar 3, 2026Updated 3 weeks ago
- Implementations of Buffets, which are efficient, composable idioms for implementing Explicit Decoupled Data Orchestration.☆82Apr 30, 2019Updated 6 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆21Nov 25, 2025Updated 3 months ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆29Mar 1, 2025Updated last year