thu-pacman / SpindleLinks
☆34Updated 2 years ago
Alternatives and similar repositories for Spindle
Users that are interested in Spindle are comparing it to the libraries listed below
Sorting:
- ☆51Updated 4 years ago
- OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering☆50Updated last year
- Hodor-PKU☆26Updated 4 years ago
- An LLVM pass to profile dynamic LLVM IR instructions and runtime values☆141Updated 5 years ago
- Tools to track memory accesses in applications and visualize the patterns to reveal opportunities for optimization.☆92Updated 10 years ago
- GKLEE is a symbolic analyser and test generator tailored for CUDA C++ programs☆40Updated 4 years ago
- DMon Prototype for OSDI 2021 Artifact Evaluation☆24Updated 4 years ago
- GPUReplay, ASPLOS 2022☆41Updated 3 years ago
- PIN-tool to produce multi-threaded atomic memory traces☆37Updated 12 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Updated 8 years ago
- LLFI is an LLVM based fault injection tool, that injects faults into the LLVM IR of the application source code. The faults can be injec…☆78Updated 3 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Updated 5 years ago
- clang & llvm examples, e.g. AST Interpreter, Function Pointer Analysis, Value Range Analysis, Data-Flow Analysis, Andersen Pointer Analys…☆277Updated 3 years ago
- A false sharing detection and repair tool☆14Updated last week
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Updated 8 years ago
- ☆26Updated 4 years ago
- ☆44Updated 4 years ago
- ☆75Updated 9 months ago
- SUPA☆28Updated 3 weeks ago
- ☆15Updated 6 years ago
- ☆66Updated 6 years ago
- a Pin tool for collecting microarchitecture-independent workload characteristics☆62Updated last year
- ☆40Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39Updated 5 years ago
- A group of students who are interested in Compilers, and they want to improve themselves together.☆25Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Updated 5 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Updated 5 years ago
- Simple passes for CFG and DFG analysis☆44Updated 6 years ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆71Updated 2 years ago