riscv-admin / uarch-side-channelsView external linksLinks
☆16Nov 28, 2024Updated last year
Alternatives and similar repositories for uarch-side-channels
Users that are interested in uarch-side-channels are comparing it to the libraries listed below
Sorting:
- ☆23Jun 23, 2023Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Group administration repository for Tech: IOPMP Task Group☆13Dec 19, 2024Updated last year
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆26Dec 18, 2025Updated last month
- Designing directory cache coherence protocols is complicated because coherence transactions are not atomic in modern multicore processors…☆16Jan 7, 2022Updated 4 years ago
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant secur…☆65Updated this week
- ☆25Jun 2, 2024Updated last year
- Enhanced PQOS (Intel RDT Software) with DDIO-related Functionalities☆16May 25, 2022Updated 3 years ago
- ☆89Aug 26, 2025Updated 5 months ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 4 months ago
- ☆22Nov 12, 2020Updated 5 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 7 months ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆80Nov 10, 2025Updated 3 months ago
- Artifact, reproducibility, and testing utilites for gem5☆23Jul 1, 2021Updated 4 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Jan 11, 2018Updated 8 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆39Jul 29, 2022Updated 3 years ago
- This is the main repo for Penglai.☆74Oct 12, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- muRISCV-NN is a collection of efficient deep learning kernels for embedded platforms and microcontrollers.☆91Oct 6, 2025Updated 4 months ago
- ☆39Sep 15, 2021Updated 4 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- RISC-V architecture concurrency model litmus tests☆100Jan 21, 2026Updated 3 weeks ago
- ☆42Sep 4, 2025Updated 5 months ago
- ☆10May 12, 2022Updated 3 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- msfinance offers Pythonic way to download market data from morningstar.com☆15Feb 15, 2025Updated 11 months ago
- EBAZ4205 Board FPGA project☆14Oct 20, 2023Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- OpenTitan FI formal verification framework☆15Aug 29, 2023Updated 2 years ago
- Vim plugin for Bluespec SystemVerilog (BSV)☆11Nov 8, 2020Updated 5 years ago
- Medium Access Control layer of 802.15.4☆13Nov 14, 2014Updated 11 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- IOMMU IP compliant with the RISC-V IOMMU Specification v1.0☆111Sep 24, 2025Updated 4 months ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- TrustZone True Number Generator☆40Apr 5, 2022Updated 3 years ago