Code for the paper “There’s Always a Bigger Fish”
☆32Nov 14, 2024Updated last year
Alternatives and similar repositories for bigger-fish
Users that are interested in bigger-fish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- Reload+Refresh PoC☆16Feb 26, 2020Updated 6 years ago
- ☆12Sep 12, 2025Updated 6 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Mar 11, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Feb 18, 2021Updated 5 years ago
- ☆34Dec 14, 2025Updated 3 months ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- ☆13Jun 22, 2019Updated 6 years ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆41Nov 13, 2021Updated 4 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- Implementation of a quantum neural network using Strawberry Fields and TensorFlow☆11May 9, 2019Updated 6 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Mar 12, 2026Updated 2 weeks ago
- Bose–Chaudhuri–Hocquenghem Codec☆14Mar 19, 2026Updated last week
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- A Python package encapsulating data about buses and bus routes of Strætó bs☆11Jul 10, 2024Updated last year
- ☆28Aug 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- ☆10May 12, 2023Updated 2 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 7 months ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- Shazam for food.☆15Dec 31, 2016Updated 9 years ago
- An reddit bot that displays useful GPA/course information in response to reddit topics/comments☆11Oct 5, 2025Updated 5 months ago
- A RISC-V system simulator with VGA, UART, memory, and JTAG debugging, interconnected with SystemC/TLM, designed with operating systems an…☆16Apr 21, 2020Updated 5 years ago
- IBM Spectrum LSF - IBM Cloud☆16Sep 30, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- On the TOCTOU Problem in Remote Attestation☆15Jun 4, 2024Updated last year
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- A focused web crawler that uses Machine Learning to fetch better relevant results.☆13Jan 12, 2019Updated 7 years ago
- protostar docker version☆14Dec 23, 2020Updated 5 years ago