preetd14
Working as a research student at The George Washington University, performing research in Computer Architecture and High-Performance Computing.
Washington DC
preetd14's Stars
angr/angr
A powerful and user-friendly binary analysis platform!
flowyroll/downfall
mfontanini/Programs-Scripts
The tiny programs and scripts that don't deserve a project, but I still want to share.
netspooky/inhale
A malware analysis and classification tool.
chokepoint/Jynx2
JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.
CesarAyalaDev/RAASNet
necst/arancino
Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.
pratikpv/malware_detect2
Malware Classification using Machine learning
mjyan0720/InvisiSpec-1.0
Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.
jdepoix/spectre-real-time-detection
This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)
elchiapp/quickhpc
An easy to use tool to stream hardware performance counters data as CSV
mktrm/SecSMT_Artifact
The artifact for SecSMT paper -- Usenix Security 2022
pietroborrello/RopGun
RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using hardware performance counters.
TheNetAdmin/NVLeak
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]
gem5-X/gem5-X
gem5-X open source project
renxida/iseedeaduops-poc
Proof-of-concept for I See Dead Micro-Ops transient execution attack
eepalms/gem5-newcache
New Cache implementation using Gem5
JIghtuse/tm-experiments
Transactional memory (mostly Intel® TSX) experiments
tongzhou80/Intel-TSX-test-suite
A suite of simple programs to test Intels' TSX extension
wuyongzheng/pin-instat
X86 Instruction Profiler
Gotchance/Dark-TRACER
Dark-TRACER: a framework for early anomaly detection of malware activities
marcusbotacin/Hardware-Assisted-AV
Additional material for the Hardware Assisted AV paper
zghodsi/NumChecker_ARM
Framework to detect kernel rootkits using Hardware Performance Counters
AbhishekShindeUTA/CSE-6324--Malware-Packer-Detection-using-Hardware-Performance-Counters
Identifying Malware Packing Algorithms using Hardware Performance Counters.
meenarapaka/Malware-Analysis-on-Hardware
Exploratory Data Analysis is performed on Malware Dataset which has seven categories of Malware and 16 Hardware Performance counters being affected by them. Through analysis is performed to determine which category of Malware is affecting the HPC's the most and which counters are vulnerable to attacks. Research is also performed to understand the threats and effects on HPC's and to identify the malware categories.
CarefulNow/Intel_TSX
Useful code snippets for Intel's Restricted Transactional Memory and Hardware Lock Elision.
ElementForte/SCSE20-0460
NTU School of Computer Science and Engineering Final Year Project SCSE20-0460 - Deep Learning based Malware Detection using Hardware Performance Counters
mohamed/fsl_perf_counter
Hardware performance counters that can be connected using Xilinx FSL protocol
Pierre-Ribault/mongoose
Prime+Probe, Flush+Reload and other cache-based attack detector using hardware performance counters
manaaralam/ARM_Board_Malware_Detection
Malware Detection Method for ARM Board