Mike
Mike
Many papers now modify BOOM to defend against Spectre attacks, such as "Secure Speculative Execution via RISC-V Open Hardware Design". Do these defenses exist on some unmerged branch of BOOM?

I ran the **./run.sh** command in Linux, and then it executed the **Xalan** binary executable file, and got an output file of _xalan.0.out_, which was the data result in html...
The code for enclave is invisible because of a 404 error on this page. And I don't know how to build this project.I hope you can help me.
Can multizone be deployed on BOOM based on RISC-V out-of-order processor? If I can, what should I do
The Opensgx simulates hardware based on the x86 instruction set, is it possible to simulate hardware based on the RISC-V instruction set?