☆14Feb 18, 2021Updated 5 years ago
Alternatives and similar repositories for dolma
Users that are interested in dolma are comparing it to the libraries listed below
Sorting:
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- ☆34Dec 14, 2025Updated 3 months ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- ☆25Mar 1, 2023Updated 3 years ago
- This repository provides Pensieve, a security evaluation framework for microarchitectural defenses against speculative execution attacks.☆24Jan 17, 2024Updated 2 years ago
- New RowHammer mitigation mechanism that is area-, performance-, and energy-efficient especially at very low (e.g., 125) RowHammer thresho…☆17May 2, 2024Updated last year
- ☆21Jun 17, 2022Updated 3 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- MIRAGE (USENIX Security 2021)☆14Nov 8, 2023Updated 2 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- gem5 Tips & Tricks☆70Feb 25, 2020Updated 6 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- FPGA-based DRAM tester supporting RDIMM DDR5 memories☆29Jan 29, 2026Updated last month
- ☆15Sep 3, 2024Updated last year
- ☆12May 16, 2025Updated 10 months ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- Tool for testing and finding minimal eviction sets☆106May 6, 2021Updated 4 years ago
- 64-bit port of the RIPE benchmark (buffer overflow attacks). RIPE was originally developed by John Wilander and Nick Nikiforakis and pres…☆23Jan 28, 2022Updated 4 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- ☆13May 26, 2022Updated 3 years ago
- ☆16Mar 18, 2025Updated last year
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Collection of scripts used for building a complete, standalone Clang/LLVM-based toolchain. See: https://clang.llvm.org/docs/Toolchain.htm…☆19Jun 12, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- PiDRAM is the first flexible end-to-end framework that enables system integration studies and evaluation of real Processing-using-Memory …☆72Dec 11, 2023Updated 2 years ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated last month
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Oct 9, 2020Updated 5 years ago
- jump to a place when progam runs to the max instruction number☆15Dec 14, 2023Updated 2 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- MEEP FPGA Shell project, currently supporting Alveos u280 and u55c☆14Mar 14, 2024Updated 2 years ago
- ☆14Apr 18, 2024Updated last year
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆13Oct 9, 2025Updated 5 months ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- ☆29Nov 5, 2021Updated 4 years ago