efeslab / silozLinks
☆11Updated 2 years ago
Alternatives and similar repositories for siloz
Users that are interested in siloz are comparing it to the libraries listed below
Sorting:
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Updated 5 years ago
- Linux source tree with Mitosis extension for x86_64.☆13Updated 5 years ago
- Tools and experiments for 0sim. Simulate system software behavior on machines with terabytes of main memory from your desktop.☆21Updated 5 years ago
- Linux source code for ISCA 2020 paper "Enhancing and Exploiting Contiguity for Fast Memory Virtualization"☆20Updated 5 years ago
- Skyloft: A General High-Efficient Scheduling Framework in User Space (SOSP 2024)☆37Updated last year
- https://rs3lab.github.io/SynCord/☆26Updated 3 years ago
- A set of tools that automate the execution of scarab simulations☆19Updated last week
- (elastic) cuckoo hashing☆15Updated 5 years ago
- ☆24Updated last year
- ☆20Updated 5 months ago
- ☆13Updated last year
- GenStore is the first in-storage processing system designed for genome sequence analysis that greatly reduces both data movement and comp…☆14Updated 3 years ago
- Exploring CXL on QEMU Emulation☆36Updated 11 months ago
- ☆23Updated 2 years ago
- ☆15Updated 3 years ago
- ☆36Updated 5 years ago
- Shielded Enclaves for Cloud FPGAs☆15Updated 4 years ago
- Artifact package for CBMM paper (ATC'22)☆11Updated 3 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Updated 7 years ago
- Virtuoso is a fast, accurate and versatile simulation framework designed for virtual memory research. Virtuoso uses a new simulation met…☆81Updated 3 weeks ago
- Slice-aware Memory Management - Exploiting NUCA Characteristic of LLC in Intel Processors☆41Updated 6 years ago
- VANS: A validated NVRAM simulator☆26Updated 2 years ago
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant secur…☆64Updated this week
- ☆21Updated 6 years ago
- ☆16Updated 2 years ago
- ☆72Updated 2 years ago
- ☆22Updated 3 years ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆42Updated 5 years ago
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆21Updated 2 months ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Updated 5 years ago