efeslab / moesi-prime
☆15Updated 2 years ago
Alternatives and similar repositories for moesi-prime:
Users that are interested in moesi-prime are comparing it to the libraries listed below
- (elastic) cuckoo hashing☆13Updated 4 years ago
- ☆18Updated 5 years ago
- Virtuoso is a new simulator that focuses on modelling various memory management and virtual memory aspects.☆29Updated last year
- ☆14Updated last year
- A fast, accurate, and easy-to-integrate memory simulator that model memory system performance with bandwidth--latency curves.☆20Updated 2 months ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆22Updated 4 months ago
- ☆18Updated last year
- A survey on architectural simulators focused on CPU caches.☆16Updated 5 years ago
- ☆33Updated 4 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆11Updated 4 years ago
- ☆11Updated 2 years ago
- ETHZ Heterogeneous Accelerated Compute Cluster.☆31Updated this week
- Implementing the Precise Runahead (HPCA'20) in gem5☆11Updated last year
- CleanupSpec (MICRO-2019)☆17Updated 4 years ago
- Fuzzing General-Purpose Hardware Designs with Software Fuzzers☆14Updated last month
- ☆16Updated 3 years ago
- MIRAGE (USENIX Security 2021)☆12Updated last year
- Benchmark suite containing cache filtered traces for use with Ramulator. These include some of the workloads used in our SIGMETRICS 2019 …☆19Updated 4 years ago
- The Next-gen Language & Compiler Powering Efficient Hardware Design☆25Updated last month
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆26Updated 4 years ago
- Creating beautiful gem5 simulations☆47Updated 3 years ago
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆18Updated 4 years ago
- A Multiplatform benchmark designed to provide holistic, detailed and close-to-hardware view of memory system performance with family of b…☆26Updated 2 months ago
- Gem5 implementation of Pinned Loads: Taming Speculative Loads in Secure Processors☆9Updated 2 years ago
- ☆19Updated 3 years ago
- Source code for the Base-Delta-Immediate Compression Algorithm (described in the PACT 2012 paper by Pekhimenko et al. at http://users.ece…☆25Updated 9 years ago
- Sampled simulation of multi-threaded applications using LoopPoint methodology☆16Updated 10 months ago
- A binary instrumentation tool to analyze load instructions in any off-the-shelf x86(-64) program. Described by Bera et al. in https://arx…☆20Updated 7 months ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Updated 5 years ago