microsoft / PanopticonLinks
Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.
☆14Updated 2 years ago
Alternatives and similar repositories for Panopticon
Users that are interested in Panopticon are comparing it to the libraries listed below
Sorting:
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆15Updated 3 years ago
- GPUReplay, ASPLOS 2022☆41Updated 3 years ago
- Criticality-aware Framework for Modeling Computer Performance☆32Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Updated last year
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆30Updated 5 months ago
- Memory consistency model checking and test generation library.☆15Updated 9 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆38Updated 3 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆27Updated 5 months ago
- HW interface for memory caches☆28Updated 5 years ago
- ☆17Updated 11 years ago
- ☆17Updated 3 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 3 years ago
- An LLVM pass to profile dynamic LLVM IR instructions and runtime values☆141Updated 5 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆23Updated 3 years ago
- A heterogeneous architecture timing model simulator.☆173Updated 3 months ago
- MIRAGE (USENIX Security 2021)☆14Updated 2 years ago
- ☆47Updated 7 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Updated 8 years ago
- ☆36Updated 6 years ago
- All the tools you need to reproduce the CellIFT paper experiments☆23Updated 10 months ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆26Updated last month
- ☆18Updated last year
- Security Test Benchmark for Computer Architectures☆21Updated 2 months ago
- CleanupSpec (MICRO-2019)☆16Updated 5 years ago
- ☆76Updated 8 months ago
- Sampled simulation of multi-threaded applications using LoopPoint methodology☆23Updated 4 months ago
- ☆16Updated 9 months ago
- ☆20Updated 5 years ago
- Manycore platform Simulation tool for NoC-based platform at a Cycle-accurate level☆11Updated 7 years ago