Spectre attack against SGX enclave
-
Updated
Jan 14, 2018 - C
Spectre attack against SGX enclave
Proof of concept code for the Spectre CPU exploit.
Experimental implementation of speculative model serving
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
Extension of the ScheduleFlow Simulator to allow speculative request times at submission and during backfill
Package speculatively provides a simple mechanism to re-execute a task in parallel only after some initial timeout has elapsed.
[NeurIPS'23] Speculative Decoding with Big Little Decoder
Microarchitectural exploitation and other hardware attacks.
Add a description, image, and links to the speculative-execution topic page so that developers can more easily learn about it.
To associate your repository with the speculative-execution topic, visit your repo's landing page and select "manage topics."