Spectre attack against SGX enclave
-
Updated
Jan 14, 2018 - C
Spectre attack against SGX enclave
[NeurIPS'23] Speculative Decoding with Big Little Decoder
Microarchitectural exploitation and other hardware attacks.
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Package speculatively provides a simple mechanism to re-execute a task in parallel only after some initial timeout has elapsed.
Experimental implementation of speculative model serving
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Proof of concept code for the Spectre CPU exploit.
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
Extension of the ScheduleFlow Simulator to allow speculative request times at submission and during backfill
Add a description, image, and links to the speculative-execution topic page so that developers can more easily learn about it.
To associate your repository with the speculative-execution topic, visit your repo's landing page and select "manage topics."