Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.
☆11Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for bp-security-framework
Users that are interested in bp-security-framework are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated last month
- The Unified TileLink Memory Subsystem Tester for XiangShan☆12Jan 7, 2026Updated last month
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Instruction decoder microbenchmark suite☆11Oct 31, 2017Updated 8 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆17Oct 17, 2022Updated 3 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆13May 15, 2020Updated 5 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated 2 weeks ago
- 面向可信执行环境的OS。☆12May 9, 2025Updated 9 months ago
- ☆37May 5, 2021Updated 4 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- Examine and discover LoongArch instructions☆22Jul 11, 2025Updated 7 months ago
- ☆28Aug 25, 2021Updated 4 years ago
- hardware & software prefetcher☆30Dec 21, 2023Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- Simple RISC-V SBI runtime library; designated for supervisor use☆25Jan 10, 2024Updated 2 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Stable, non-KVM version of PTLsim.☆29Feb 16, 2016Updated 10 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- ☆37May 19, 2023Updated 2 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Aug 17, 2018Updated 7 years ago
- Code for the paper “There’s Always a Bigger Fish”☆32Nov 14, 2024Updated last year
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- ☆34Dec 14, 2025Updated 2 months ago
- ☆45Jul 19, 2023Updated 2 years ago