jprx / pretty-secure-processorLinks
A security oriented SoC featuring a custom pipelined RISC-V core and LCD-TFT controller
☆13Updated 4 years ago
Alternatives and similar repositories for pretty-secure-processor
Users that are interested in pretty-secure-processor are comparing it to the libraries listed below
Sorting:
- ☆62Updated 3 weeks ago
- Artifacts for Cascade: CPU Fuzzing via Intricate Program Generation (USENIX Security 2024)☆129Updated 9 months ago
- HW Design Collateral for Caliptra RoT IP☆94Updated this week
- A concolic testing engine for RISC-V embedded software with support for SystemC peripherals☆23Updated last year
- This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory prot…☆68Updated 2 weeks ago
- Machine-readable database of the RISC-V specification, and tools to generate various views☆74Updated this week
- Exploring gate level simulation☆58Updated last month
- This specification is integrated into the Priv. and Unpriv. specifications. This repo is no longer maintained. Please refer to the Priv. …☆87Updated 3 weeks ago
- Side-channel analysis setup for OpenTitan☆33Updated last week
- Proof of concepts for speculative attacks using the BOOM core (https://github.com/riscv-boom/riscv-boom)☆64Updated 5 years ago
- Microarchitectural control flow integrity (𝜇CFI) verification checks whether there exists a control or data flow from instruction's ope…☆13Updated 3 months ago
- A full micro-controller system utilizing the CHERIoT Ibex core, part of the Sunburst project funded by UKRI☆41Updated this week
- cheriot-ibex is a RTL implementation of CHERIoT ISA based on LowRISC's Ibex core.☆110Updated this week
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆40Updated this week
- RiscyOO: RISC-V Out-of-Order Processor☆156Updated 4 years ago
- Trigger the rowhammer bug on ARMv8☆32Updated 6 years ago
- Testing processors with Random Instruction Generation☆38Updated last week
- ☆16Updated 2 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆22Updated 8 months ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆14Updated 2 years ago
- Code repository for Coppelia tool☆23Updated 4 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆67Updated 2 months ago
- Tutorial tour of the RISC-V ISA Spec (expressed in SAIL ISA spec language)☆36Updated 4 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆131Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 9 months ago
- RISC-V fast interrupt controller☆24Updated last month
- ☆10Updated 6 months ago
- rfuzz: coverage-directed fuzzing for RTL research platform☆105Updated 3 years ago
- Bitfiltrator: A general approach for reverse-engineering Xilinx bitstream formats☆42Updated 2 years ago
- RISC-V Core; superscalar, out-of-order, multi-core capable; based on RISCY-OOO from MIT☆174Updated 3 weeks ago