☆16Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for halfdouble
Users that are interested in halfdouble are comparing it to the libraries listed below
Sorting:
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆60Jun 19, 2025Updated 9 months ago
- ☆17Aug 25, 2022Updated 3 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- ☆113Jul 16, 2023Updated 2 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Aug 23, 2017Updated 8 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆249Jan 27, 2024Updated 2 years ago
- FPGA-driven memory tester for SO-DIMM DDR5 memory sticks☆31Dec 11, 2025Updated 3 months ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- A bunch of sample codes related to kernel fuzzing☆12Feb 7, 2019Updated 7 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- ☆20Oct 24, 2024Updated last year
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Aug 12, 2024Updated last year
- Revizor - Hardware fuzzing for the age of speculation☆182Mar 4, 2026Updated 2 weeks ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- ☆15Sep 17, 2024Updated last year
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Mar 12, 2026Updated last week
- ☆46Jul 19, 2023Updated 2 years ago
- Scraper to get data from crunchbase.com and read - write the data using SQLite database and JSON file.☆16Apr 27, 2019Updated 6 years ago
- Exports an LLVM control flow graph (CFG) (including function calls) to JSON☆25Nov 26, 2021Updated 4 years ago
- Windows driver to get RAPL metrics from a bare metal machine.☆21Nov 4, 2024Updated last year
- ☆10May 12, 2023Updated 2 years ago
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Feb 16, 2022Updated 4 years ago
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 9 months ago