zilongwang123 / LeaVeView external linksLinks
A tool for checking the contract satisfaction for hardware designs
☆12Nov 4, 2025Updated 3 months ago
Alternatives and similar repositories for LeaVe
Users that are interested in LeaVe are comparing it to the libraries listed below
Sorting:
- Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operat…☆22Oct 25, 2024Updated last year
- Random Generator of Btor2 Files☆10Sep 2, 2023Updated 2 years ago
- ☆11Jul 1, 2025Updated 7 months ago
- Arithmetic multiplier benchmarks☆12Nov 13, 2017Updated 8 years ago
- rIC3 model checker for Hardware Model Checking Competition 2024(HWMCC'24) submission☆11Jul 4, 2025Updated 7 months ago
- LLM Evaluation Benchmark on Hardware Formal Verification☆35Apr 3, 2025Updated 10 months ago
- GOMIL: Global Optimization of Multiplier by Integer Linear Programming☆13Aug 25, 2021Updated 4 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks ba…☆21Mar 2, 2023Updated 2 years ago
- ☆20Jun 11, 2025Updated 8 months ago
- ☆17Nov 19, 2023Updated 2 years ago
- ☆19Jan 2, 2026Updated last month
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆19Dec 21, 2020Updated 5 years ago
- All the tools you need to reproduce the CellIFT paper experiments☆24Feb 11, 2025Updated last year
- ☆19Dec 29, 2014Updated 11 years ago
- Logic optimization and technology mapping tool.☆20Oct 12, 2023Updated 2 years ago
- Fast Symbolic Repair of Hardware Design Code☆33Jan 20, 2025Updated last year
- AMulet 2. - A better AIG Multiplier Examination Tool☆26Dec 23, 2025Updated last month
- IC3 reference implementation: a short, simple, fairly competitive implementation of IC3. Read it, tune it, extend it, play with it.☆63May 31, 2015Updated 10 years ago
- ☆36Apr 11, 2025Updated 10 months ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆40Nov 29, 2025Updated 2 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- The HW-CBMC and EBMC Model Checkers for Verilog☆102Updated this week
- Atom linter for Verilog/SystemVerilog, using Icarus Verilog, Slang, Verible or Verilator.☆10Jul 12, 2023Updated 2 years ago
- iEDA water-drop training initiative☆13Sep 10, 2024Updated last year
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 8 years ago
- ☆10Jun 4, 2021Updated 4 years ago
- Boosted E-Graph Extraction with Adaptive Heuristics and Exact Solving☆25Jan 7, 2026Updated last month
- ☆12Jan 9, 2026Updated last month
- ☆17Dec 16, 2025Updated 2 months ago
- Graph-based neural tactic prediction models for Coq.☆15Sep 17, 2025Updated 4 months ago
- SAT solvers from Knuth's The Art of Computer Programming, Vol. 4B☆10Jan 5, 2026Updated last month
- ☆12Sep 12, 2025Updated 5 months ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- Control Logic Synthesis: Drawing the Rest of the OWL☆13Jun 17, 2024Updated last year
- ☆11Jun 11, 2021Updated 4 years ago
- Tools for manipulating CHC and related files☆15Apr 21, 2023Updated 2 years ago