Data oblivious ISA prototyped on the RISC-V BOOM processor.
☆23Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for oisa
Users that are interested in oisa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35Dec 14, 2025Updated 4 months ago
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 10 months ago
- RISC-V Security HC admin repo☆17Jan 7, 2025Updated last year
- Group administration repository for Tech: IOPMP Task Group☆13Dec 19, 2024Updated last year
- ☆17Oct 9, 2023Updated 2 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated 2 months ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆35Oct 16, 2020Updated 5 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- A project to demonstrate Xilinx MPSOC running Ubuntu☆20Feb 8, 2026Updated 2 months ago
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Dec 8, 2021Updated 4 years ago
- Tests for verifying compliance of RMM implementations☆23Updated this week
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 7 months ago
- ☆90Jan 20, 2023Updated 3 years ago
- ☆36Jun 19, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code for "Fast Sparse ConvNets" CVPR2020 submissions☆12Nov 20, 2019Updated 6 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- A Tool for the Static Analysis of Cache Side Channels☆43Mar 5, 2017Updated 9 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Updated this week
- ☆35Mar 1, 2019Updated 7 years ago
- Minimal TensorFlow implementation of the Advantage Actor-Critic model for Atari games☆12Feb 15, 2018Updated 8 years ago
- ☆21Feb 6, 2020Updated 6 years ago
- ☆20Mar 3, 2026Updated 2 months ago
- Implementations of Buffets, which are efficient, composable idioms for implementing Explicit Decoupled Data Orchestration.☆82Apr 30, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The OpenPiton Platform☆31May 22, 2023Updated 2 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Apr 3, 2026Updated last month
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆30Mar 1, 2025Updated last year
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆42Nov 29, 2025Updated 5 months ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago