☆22Dec 2, 2022Updated 3 years ago
Alternatives and similar repositories for TAP
Users that are interested in TAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago
- PipeProof☆11Dec 18, 2019Updated 6 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆36May 12, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆27Mar 5, 2026Updated last month
- Microarchitectural control flow integrity (𝜇CFI) verification checks whether there exists a control or data flow from instruction's ope…☆16Feb 12, 2026Updated 2 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- An API that can be used to expose an SMT-LIB compliant SMT solver to a developer tool written in Rust.☆36Jan 17, 2020Updated 6 years ago
- How to plot for papers, slides, demos, etc.☆10Apr 7, 2022Updated 4 years ago
- Group Signature Camenisch-Lysyanskaya Scheme C++, Pairing-Based Cryptography library☆14Feb 16, 2015Updated 11 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆109Aug 18, 2022Updated 3 years ago
- Analyze experimental data with Programming by Navigation☆17Updated this week
- Arithmetic multiplier benchmarks☆12Nov 13, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated Reasoning for the Working Mathematician☆11Aug 30, 2019Updated 6 years ago
- Minimal RISC Extensions for Isolated Execution☆54Jul 11, 2019Updated 6 years ago
- Collection of utlities for writing parsers. Includes a fast DIMACS CNF parser.☆15Nov 19, 2024Updated last year
- LEC - Logic Equivalence Checking - Formal Verification☆38Apr 24, 2026Updated last week
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- A fork of Yosys that integrates the CellIFT pass☆13Apr 21, 2026Updated last week
- GuidedSampler: Coverage-guided Sampling of SMT Solutions☆15Jul 9, 2025Updated 9 months ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Sep 11, 2017Updated 8 years ago
- Automated Controller Synthesis☆15Jun 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Rust Bindings to interact with SMTLIB2 compliant solvers☆17Jun 3, 2019Updated 6 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- A simple, but fast, triangular solver☆18Mar 22, 2021Updated 5 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Differential CPU fuzzing framework from the paper "RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabiliti…☆26Mar 1, 2026Updated 2 months ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Jul 21, 2023Updated 2 years ago
- ☆13Apr 3, 2026Updated 3 weeks ago
- Interesting papers☆11Jun 22, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- ☆10May 31, 2023Updated 2 years ago
- ☆41Apr 24, 2026Updated last week
- ☆16Jan 5, 2022Updated 4 years ago
- Evaluation code for confidential virtual machines (AMD SEV-SNP / Intel TDX)☆14Mar 12, 2026Updated last month
- High-level performance analyser toolkit for Intel SGX☆39Aug 30, 2019Updated 6 years ago
- UCLID5: formal modeling, verification, and synthesis of computational systems☆157Mar 2, 2026Updated last month