Code for the paper “There’s Always a Bigger Fish”
☆33Nov 14, 2024Updated last year
Alternatives and similar repositories for bigger-fish
Users that are interested in bigger-fish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- Reload+Refresh PoC☆17Feb 26, 2020Updated 6 years ago
- ☆12Sep 12, 2025Updated 7 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Apr 26, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Feb 18, 2021Updated 5 years ago
- ☆35Dec 14, 2025Updated 4 months ago
- ☆14Jun 22, 2019Updated 6 years ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 6 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆42Nov 13, 2021Updated 4 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆20Apr 2, 2026Updated last month
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- A Python package encapsulating data about buses and bus routes of Strætó bs☆11Jul 10, 2024Updated last year
- ☆27Aug 25, 2021Updated 4 years ago
- A RIME IME for Taishanese☆11Aug 3, 2023Updated 2 years ago
- ☆11Aug 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Backend HTTP API for Parol – the Esperanto speech robot☆19Feb 18, 2020Updated 6 years ago
- ☆10May 12, 2023Updated 2 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 5 months ago
- PAF (the Physical Attack Framework) is a framework for learning about physical attacks: fault injection and side channels☆26Nov 20, 2025Updated 5 months ago
- A low-cost remote vital signs monitor for home patients☆13Feb 19, 2026Updated 2 months ago
- Shazam for food.☆15Dec 31, 2016Updated 9 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆14Aug 11, 2025Updated 8 months ago
- IBM Spectrum LSF - IBM Cloud☆16Sep 30, 2024Updated last year
- ☆14Mar 15, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- ☆12Sep 4, 2024Updated last year
- 🇮🇸 A guide aiming to help newcomers to have a successful start in Reykjavík!☆21Jan 30, 2025Updated last year
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 10 months ago
- Source code for the architectural and circuit-level simulators used for modeling the CROW (Copy-ROW DRAM) mechanism proposed in our ISCA …☆15Aug 2, 2019Updated 6 years ago