smartnic / superopt
A superoptimizing compiler for packet-processing
☆30Updated last year
Alternatives and similar repositories for superopt:
Users that are interested in superopt are comparing it to the libraries listed below
- Code artifact of the papers "A Simpler and Faster NIC Driver Model for Network Functions" (OSDI 2020) and "Safe low-level code without ov…☆62Updated 2 years ago
- SIGCOMM 2021 artifact☆12Updated 9 months ago
- ☆31Updated 6 years ago
- An assembler for eBPF programs written in an Intel-like assembly syntax.☆47Updated last year
- This repo contains the artifact for our SOSP'19 paper on Serval☆30Updated 5 years ago
- ☆29Updated last month
- i10 kernel implementation (NSDI'20)☆51Updated 4 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆27Updated 4 years ago
- ☆15Updated 6 years ago
- ☆15Updated last year
- [NSDI '24] DINT: Fast In-Kernel Distributed Transactions with eBPF☆45Updated 10 months ago
- ☆20Updated 3 years ago
- ☆31Updated 5 years ago
- Main repository of the Vigor NF verification project.☆48Updated 4 years ago
- ☆23Updated last month
- Artifacts for ATC '22 paper "Faster Software Packet Processing on FPGA NICs with eBPF Program Warping"☆17Updated 2 years ago
- Extend Open vSwitch with BPF programs at runtime☆32Updated 5 years ago
- A BPF-based syscall fault injector☆102Updated 2 years ago
- Finding bugs in P4 compilers using translation validation.☆37Updated last month
- ☆26Updated 2 years ago
- Morpheus: Domain Specific Run Time Optimization for Software Data Planes -- Presented at ASPLOS22☆34Updated last year
- perf-script and (Linux, QEMU, SeaBIOS) patches to measure the boot time of a Linux VM with QEMU☆38Updated 5 years ago
- ☆42Updated 10 months ago
- X-Change: Efficient Metadata Management Model for Packet Processing☆17Updated 4 years ago
- ☆30Updated 3 years ago
- Memory access tracing QEMU☆97Updated 8 years ago
- ☆30Updated 2 weeks ago
- [MICRO'20] LENS: A Low-level NVRAM Profiler [USENIX Security'23] NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems☆14Updated 10 months ago
- ☆25Updated 2 years ago
- ☆47Updated 2 years ago