madsys-dev / syscall_interceptLinks
The system call intercepting library
☆23Updated 3 years ago
Alternatives and similar repositories for syscall_intercept
Users that are interested in syscall_intercept are comparing it to the libraries listed below
Sorting:
- Yizhou' Homepage☆53Updated 3 weeks ago
- Skyloft: A General High-Efficient Scheduling Framework in User Space (SOSP 2024)☆36Updated last year
- ☆58Updated last year
- HERMES: sHallow dirEctory stRucture Many-filE fileSystem☆20Updated 6 years ago
- My knowledge base☆76Updated last week
- Tsinghua Advanced Networking Labs on FPGA☆39Updated last year
- User-mode trap-and-emulate hypervisor for RISC-V☆14Updated 3 years ago
- What if everything is a io_uring?☆16Updated 3 years ago
- A hand-written recursive decent Verilog parser.☆10Updated 3 years ago
- CPU micro benchmarks☆74Updated last week
- A Progam-Behavior-Guided Far Memory System☆35Updated 2 years ago
- Implements kernels with RISC-V Vector☆22Updated 2 years ago
- ☆23Updated 2 years ago
- Warning: 🕳 ahead!☆16Updated 6 years ago
- Backend & Frontend for JieLabs☆22Updated 2 years ago
- A hardware accelerated IP packet forwarder running on programmable ICs☆15Updated 2 years ago
- ☆72Updated 2 years ago
- Plagiarism detection tool in Rust (inspired by Stanford Moss)☆54Updated 4 months ago
- Clio, ASPLOS'22.☆78Updated 3 years ago
- Linux kernel labs☆55Updated 4 years ago
- https://rs3lab.github.io/SynCord/☆26Updated 3 years ago
- WineFS (SOSP 21): a huge-page aware file system for persistent memory☆36Updated 2 years ago
- A router IP written in Verilog.☆12Updated 6 years ago
- Repo for OSDI 2023 paper: "Ship your Critical Section Not Your Data: Enabling Transparent Delegation with TCLocks"☆21Updated last year
- Tomasulo Simulator written in React as the project for Computer Architecture course, Spring 2019, Tsinghua University☆11Updated 6 years ago
- A GPU FP32 computation method with Tensor Cores.☆26Updated last month
- ☆64Updated last year
- A summary of my projects☆49Updated 2 weeks ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆42Updated 5 years ago
- ☆42Updated 2 years ago