A Modified gem5 for Simulating Virtualized Systems
☆11Mar 1, 2015Updated 11 years ago
Alternatives and similar repositories for gem5v
Users that are interested in gem5v are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- Python library to collect performance events☆14Jan 30, 2023Updated 3 years ago
- 64-bit port of the RIPE benchmark (buffer overflow attacks). RIPE was originally developed by John Wilander and Nick Nikiforakis and pres…☆23Jan 28, 2022Updated 4 years ago
- MESIF cache coherency protocol for the GEM5 simulator☆15Jun 2, 2016Updated 9 years ago
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Troff/Groff Resources.☆20Sep 10, 2025Updated 6 months ago
- CATBench, the Intel Cache Allocation Technology benchmarking suite described in our tech report, "Simple Cache Partitioning for Networked…☆12Oct 6, 2017Updated 8 years ago
- NJE protocol for Unix☆19Aug 30, 2025Updated 6 months ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- A suite of simple programs to test Intels' TSX extension☆14May 13, 2017Updated 8 years ago
- This repo contains a RISC-V ISA extension (proposal) to allow recording of control transfer history to on-chip registers, to support usag…☆23Mar 10, 2026Updated 2 weeks ago
- Convergent Dispersal Deduplication Datastore☆10Jan 21, 2016Updated 10 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- Transactional memory (mostly Intel® TSX) experiments☆14May 3, 2014Updated 11 years ago
- X86 Instruction Profiler☆13May 19, 2014Updated 11 years ago
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 8 years ago
- A git repository for the bmake releases☆23Oct 11, 2021Updated 4 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- realtime FFT of audio input, for iPad using Swift and Metal☆21Dec 26, 2020Updated 5 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- This project was done as a part of RISC-V based MYTH (Microprocessor for you in Thirty Hours) workshop organized by Kunal Ghosh and Steve…☆17Sep 23, 2020Updated 5 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- A concolic testing engine for RISC-V embedded software with support for SystemC peripherals☆27Oct 4, 2023Updated 2 years ago
- A Benchmark Suite for Real-Time Robotics☆12May 3, 2023Updated 2 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- FlipIt: An LLVM Based Fault Injector for HPC☆14May 14, 2021Updated 4 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Jul 6, 2018Updated 7 years ago
- Please see the paper "COLORIS: A Dynamic Cache Partitioning System Using Page Coloring" for details.☆17May 9, 2017Updated 8 years ago
- Repository for author masking☆13Oct 29, 2018Updated 7 years ago
- This adds partial support of AVX2 and AVX-512 to gem5.☆15Dec 19, 2023Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- ☆21Dec 4, 2020Updated 5 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago