ReDMArk: Bypassing RDMA Security Mechanisms.
☆44Oct 19, 2020Updated 5 years ago
Alternatives and similar repositories for redmark
Users that are interested in redmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Dec 20, 2021Updated 4 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Oct 24, 2020Updated 5 years ago
- Justitia provides RDMA isolation between applications with diverse requirements.☆43May 25, 2022Updated 3 years ago
- ☆54Feb 1, 2026Updated 2 months ago
- ☆11Oct 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆71Feb 13, 2022Updated 4 years ago
- ☆68May 1, 2017Updated 8 years ago
- (WIP) A relatively simple pipelined RISC-V core, written in Bluespec SystemVerilog☆12Sep 9, 2021Updated 4 years ago
- Lumina is a user-friendly tool to test the correctness and performance of hardware network stacks.☆29Jan 8, 2024Updated 2 years ago
- Benchmark Test Suite for RDMA Networks☆59Apr 15, 2023Updated 3 years ago
- Hydra adds resilience and high availability to remote memory solutions.☆33Feb 22, 2022Updated 4 years ago
- ☆32May 23, 2024Updated last year
- Prefetching and efficient data path for memory disaggregation☆69Jul 16, 2020Updated 5 years ago
- Source code of paper "Probabilistic Profiling of Stateful Data Planes for Adversarial Testing"☆12Apr 19, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆31May 1, 2022Updated 3 years ago
- A framework to understand RDMA☆410Oct 12, 2023Updated 2 years ago
- Cluster Far Mem, framework to execute single job and multi job experiments using fastswap☆21Jan 12, 2024Updated 2 years ago
- Arrow Matrix Decomposition - Communication-Efficient Distributed Sparse Matrix Multiplication☆15Mar 25, 2024Updated 2 years ago
- ☆16Feb 17, 2026Updated 2 months ago
- Fastswap, a fast swap system for far memory through RDMA☆85Nov 19, 2023Updated 2 years ago
- ☆21Jun 6, 2022Updated 3 years ago
- In-Network Nmap (Scanner)☆34Jan 13, 2022Updated 4 years ago
- LITE Kernel RDMA Support for Datacenter Applications. SOSP 2017.☆111Jul 9, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Mar 29, 2019Updated 7 years ago
- A Memory-Disaggregated Managed Runtime.☆67Aug 28, 2021Updated 4 years ago
- ☆405Oct 4, 2023Updated 2 years ago
- Vijos: Vijos Isn't Just an Operating System☆10May 31, 2020Updated 5 years ago
- A 3d printed case design for Lichee Pi 4A☆11May 13, 2023Updated 2 years ago
- The accelerometer analytical model published in ASPLOS 2020 (Accelerometer: Understanding Acceleration Opportunities forData Center Overh…☆16Jan 18, 2020Updated 6 years ago
- *flow source code☆23Aug 27, 2020Updated 5 years ago
- ☆14Sep 27, 2021Updated 4 years ago
- Source code for the architectural and circuit-level simulators used for modeling the CROW (Copy-ROW DRAM) mechanism proposed in our ISCA …☆15Aug 2, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An RDMA skew-aware key-value store, which implements the Scale-Out ccNUMA design, to exploit skew in order to increase performance of dat…☆19Jul 1, 2021Updated 4 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- ☆20Jul 7, 2017Updated 8 years ago
- P4 BMV2 docker container☆22Sep 25, 2018Updated 7 years ago
- A Network Function (NF) that re-orders packets per flow by buffering packets for a given time.☆23Dec 4, 2022Updated 3 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 10 months ago
- A tutorial on RDMA based programming using code examples☆614Jan 3, 2020Updated 6 years ago