Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.
☆11Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for bp-security-framework
Users that are interested in bp-security-framework are comparing it to the libraries listed below
Sorting:
- The Unified TileLink Memory Subsystem Tester for XiangShan☆12Mar 6, 2026Updated 2 weeks ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆13May 15, 2020Updated 5 years ago
- Examine and discover LoongArch instructions☆22Jul 11, 2025Updated 8 months ago
- ☆12Apr 1, 2025Updated 11 months ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- 面向可信执行环境的OS。☆12May 9, 2025Updated 10 months ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Instruction decoder microbenchmark suite☆11Oct 31, 2017Updated 8 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Mar 12, 2026Updated last week
- hardware & software prefetcher☆30Dec 21, 2023Updated 2 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last month
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆16Oct 17, 2022Updated 3 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆62Feb 22, 2017Updated 9 years ago
- ☆12Feb 27, 2025Updated last year
- ☆37May 5, 2021Updated 4 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- implementation of aided LLM codeplan algorithm in java☆10Jan 13, 2024Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- ☆46Jul 19, 2023Updated 2 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- A conda-smithy repository for memory_profiler.☆12Updated this week
- ☆28Aug 25, 2021Updated 4 years ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Cachebench, with hacks to make it run on SmartOS / x86.☆11Feb 15, 2012Updated 14 years ago
- 武汉大学博士/硕士学位论文latex模板(包含插图索引、表格索引、中英文缩略语对照、主要符号表等,字体格式以及排版修正)☆27Feb 18, 2025Updated last year
- ☆34Dec 14, 2025Updated 3 months ago
- Stable, non-KVM version of PTLsim.☆29Feb 16, 2016Updated 10 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- ☆10May 12, 2023Updated 2 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Jan 23, 2026Updated last month
- Synthesiser for Asynchronous Verilog Language☆20Oct 29, 2014Updated 11 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago
- Simple RISC-V SBI runtime library; designated for supervisor use☆25Jan 10, 2024Updated 2 years ago