Spectre attack against SGX enclave
-
Updated
Jan 14, 2018 - C
Spectre attack against SGX enclave
[NeurIPS'23] Speculative Decoding with Big Little Decoder
Microarchitectural exploitation and other hardware attacks.
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Package speculatively provides a simple mechanism to re-execute a task in parallel only after some initial timeout has elapsed.
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Experimental implementation of speculative model serving
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
Proof of concept code for the Spectre CPU exploit.
Extension of the ScheduleFlow Simulator to allow speculative request times at submission and during backfill
Add a description, image, and links to the speculative-execution topic page so that developers can more easily learn about it.
To associate your repository with the speculative-execution topic, visit your repo's landing page and select "manage topics."