ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
☆20Apr 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for prospect
Users that are interested in prospect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- The SpinalHDL design of the Proteus core, an extensible RISC-V core.☆62Apr 16, 2026Updated last month
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆18Nov 15, 2022Updated 3 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Jul 21, 2023Updated 2 years ago
- BU-maintained version of the Jailhouse partitioning hypervisor with real-time features☆16Feb 28, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Formally proven secure design of the RISC-V core BOOM (Berkeley Out-of-Order Machine) w.r.t. transient execution attacks (e.g., Meltdown …☆14Jan 17, 2025Updated last year
- A set of synthetic benchmarks used in IEEE RTAS 2016 paper by Prathap et al.,☆19Mar 31, 2026Updated last month
- SonicBOOM Spectre Attacks☆11Jul 18, 2021Updated 4 years ago
- DOM Protected Hardware Implementation of AES☆28May 20, 2016Updated 10 years ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Code for the paper “There’s Always a Bigger Fish”☆33Nov 14, 2024Updated last year
- Linux kernel branches for confidential compute research☆20Apr 6, 2026Updated last month
- ☆35Dec 14, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆19Aug 21, 2021Updated 4 years ago
- Proof of concepts for speculative attacks using the BOOM core (https://github.com/riscv-boom/riscv-boom)☆69Oct 18, 2019Updated 6 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- Code for "Fast Sparse ConvNets" CVPR2020 submissions☆12Nov 20, 2019Updated 6 years ago
- Dual RISC-V DISC with integrated eFPGA☆18Oct 9, 2021Updated 4 years ago
- Minimal TensorFlow implementation of the Advantage Actor-Critic model for Atari games☆12Feb 15, 2018Updated 8 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Apr 3, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Mar 7, 2023Updated 3 years ago
- ☆22Mar 1, 2026Updated 2 months ago
- Design and Verification of a Complete Application Specific Integrated Circuit☆12Nov 21, 2016Updated 9 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- TensorFlow Lite for Microcontrollers Python package for Raspberry Pi Zero☆13Jan 24, 2022Updated 4 years ago
- Xen hypercall and interfaces in Rust☆19Jan 14, 2025Updated last year
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆64Aug 7, 2022Updated 3 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆50Aug 12, 2022Updated 3 years ago
- Java Project MineSweeper Source Code☆13Jun 2, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Rust-based Unikernel Enhancing Reliability and Efficiency of Embedded Systems.☆11Jun 28, 2024Updated last year
- ☆17Jun 26, 2025Updated 10 months ago
- Benchmark suite for real-time behavior, including interrupt latency and context switching times☆15Oct 20, 2021Updated 4 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 9 years ago
- ☆15Apr 25, 2024Updated 2 years ago
- Virtio in userspace☆12Nov 8, 2011Updated 14 years ago
- Running Linux on IOb-SoC-OpenCryptoHW☆15Aug 15, 2024Updated last year