☆12Sep 12, 2025Updated 5 months ago
Alternatives and similar repositories for delayAVF
Users that are interested in delayAVF are comparing it to the libraries listed below
Sorting:
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- M1 bare metal project in Rust☆31Sep 1, 2022Updated 3 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆48Aug 12, 2022Updated 3 years ago
- Patch your macOS kernel to enable support for the high-resolution timers on M1☆38May 8, 2025Updated 9 months ago
- An IOKit kext designed for microarchitectural security research on M1☆46Oct 30, 2022Updated 3 years ago
- This repository provides Pensieve, a security evaluation framework for microarchitectural defenses against speculative execution attacks.☆24Jan 17, 2024Updated 2 years ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- Code for the paper “There’s Always a Bigger Fish”☆32Nov 14, 2024Updated last year
- A custom 16-bit computer☆12Oct 17, 2018Updated 7 years ago
- The Unified TileLink Memory Subsystem Tester for XiangShan☆12Jan 7, 2026Updated last month
- A tool for checking the contract satisfaction for hardware designs☆12Nov 4, 2025Updated 3 months ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- 简单的未优化的SRT除法器☆12Jun 16, 2024Updated last year
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- ⚖️ Zugang zu Recht - Access to Justice - A2J ⚖️☆13Updated this week
- Verilog program☆16Jul 27, 2020Updated 5 years ago
- A RISC-V system simulator with VGA, UART, memory, and JTAG debugging, interconnected with SystemC/TLM, designed with operating systems an…☆16Apr 21, 2020Updated 5 years ago
- 基4booth乘法器设计与验证☆15Apr 28, 2024Updated last year
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- protostar docker version☆14Dec 23, 2020Updated 5 years ago
- A Minimal, Configurable, Single-User GTK3 LightDM Greeter☆10Jun 28, 2019Updated 6 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Aug 28, 2025Updated 6 months ago
- Insecure reference example for the 2022 Collegiate eCTF☆13Apr 6, 2022Updated 3 years ago
- About the source code of "Merging Similar Patterns for Hardware Prefetching" paper, which is accepted in MICRO 2022.☆14Mar 1, 2023Updated 3 years ago
- A security oriented SoC featuring a custom pipelined RISC-V core and LCD-TFT controller☆15Dec 26, 2020Updated 5 years ago
- ☆12Nov 27, 2021Updated 4 years ago
- ☆17Jun 26, 2025Updated 8 months ago
- Java Project MineSweeper Source Code☆13Jun 2, 2021Updated 4 years ago
- ☆18Feb 16, 2019Updated 7 years ago
- ☆19Feb 28, 2021Updated 5 years ago
- QuardStar Tutorial is all you need !☆17Sep 11, 2024Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- 给NEMU移植Linux Kernel!☆22Jun 1, 2025Updated 9 months ago
- ☆22Feb 14, 2022Updated 4 years ago
- A compiler for Andrew Appel's Tiger language from the 1990s.☆19Jan 3, 2023Updated 3 years ago
- data preprocessing scripts for gem5 output☆19May 23, 2025Updated 9 months ago
- Reasoning LLMs optimized for Chisel code generation☆23Jun 19, 2025Updated 8 months ago
- Source codes for "Bouquet of Instruction Pointers"☆17Nov 4, 2020Updated 5 years ago
- Fancy upgrade to console.log☆21Jun 1, 2022Updated 3 years ago