Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.
☆11Oct 30, 2025Updated 5 months ago
Alternatives and similar repositories for bp-security-framework
Users that are interested in bp-security-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Unified TileLink Memory Subsystem Tester for XiangShan☆14Apr 2, 2026Updated last week
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆13May 15, 2020Updated 5 years ago
- Examine and discover LoongArch instructions☆23Jul 11, 2025Updated 8 months ago
- ☆13Apr 1, 2025Updated last year
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 面向可信执行环境的OS。☆12May 9, 2025Updated 11 months ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Instruction decoder microbenchmark suite☆11Oct 31, 2017Updated 8 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Apr 2, 2026Updated last week
- hardware & software prefetcher☆30Dec 21, 2023Updated 2 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last month
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆16Oct 17, 2022Updated 3 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Feb 27, 2025Updated last year
- ☆37May 5, 2021Updated 4 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- implementation of aided LLM codeplan algorithm in java☆10Jan 13, 2024Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- ☆47Jul 19, 2023Updated 2 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A conda-smithy repository for memory_profiler.☆12Mar 16, 2026Updated 3 weeks ago
- ☆28Aug 25, 2021Updated 4 years ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Cachebench, with hacks to make it run on SmartOS / x86.☆11Feb 15, 2012Updated 14 years ago
- 武汉大学博士/硕士学位论文latex模板(包含插图索引、表格索引、中英文缩略语对照、主要符号表等,字体格式以及排版修正)☆28Feb 18, 2025Updated last year
- ☆34Dec 14, 2025Updated 3 months ago
- Stable, non-KVM version of PTLsim.☆29Feb 16, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Aug 23, 2023Updated 2 years ago
- ☆10May 12, 2023Updated 2 years ago
- Synthesiser for Asynchronous Verilog Language☆20Oct 29, 2014Updated 11 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Mar 25, 2026Updated 2 weeks ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago
- Simple RISC-V SBI runtime library; designated for supervisor use☆25Jan 10, 2024Updated 2 years ago